Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
    Cybersecurity

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    adminBy adminApril 16, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananApr 16, 2026Malware / Threat Intelligence

    The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and WhatsApp.

    The activity, which was observed between March and April 2026, has been attributed to a threat cluster dubbed UAC-0247. The origins of the campaign are presently unknown.

    According to CERT-UA, the starting point of the attack chain is an email message claiming to be a humanitarian aid proposal, urging recipients to click on a link that redirects to either a legitimate website compromised via a cross-site scripting (XSS) vulnerability or a bogus site created with help from artificial intelligence (AI) tools.

    Regardless of what the site is, the goal is to download and run a Windows Shortcut (LNK) file, which then executes a remote HTML Application (HTA) using the native Windows utility, “mshta.exe.”The HTA file, for its part, displays a decoy form to divert the victim’s attention, while simultaneously fetching a binary responsible for injecting shellcode into a legitimate process (e.g., “runtimeBroker.exe”).

    “At the same time, recent campaigns have recorded the use of a two-stage loader, the second stage of which is implemented using a proprietary executable file format (with full support for code and data sections, import of functions from dynamic libraries, and relocation), and the final payload is additionally compressed and encrypted,” CERT-UA said.

    One of the stagers is a tool called TCP reverse shell or its equivalent, tracked as RAVENSHELL, which establishes a TCP connection with a management server to receive commands for execution on the host using “cmd.exe.”

    Also downloaded to the infected machine is a malware family dubbed AGINGFLY and a PowerShell script referred to as SILENTLOOP that comes with several functions to execute commands, auto-update configuration, and obtain the current IP address of the management server from a Telegram channel, and fall back to alternative mechanisms for determining the command-and-control (C2) address.

    Developed using C#, AGINGFLY is engineered to provide remote control of the affected systems. It communicates with a C2 server using WebSockets to fetch commands that allow it to run commands, launch a keylogger, download files, and run additional payloads.

    An investigation of about a dozen incidents has revealed that these attacks facilitate reconnaissance, lateral movement, and the theft of credentials and other sensitive data from WhatsApp and Chromium-based browsers. Thisis accomplished by deploying various open-source tools, such as those listed below –

    • ChromElevator, a program designed to bypass Chromium’s app-bound encryption (ABE) protections and harvest cookies and saved passwords
    • ZAPiXDESK, a forensic extraction tool to decrypt local databases for WhatsApp Web
    • RustScan, a network scanner
    • Ligolo-Ng, a lightweight utility to establish tunnels from reverse TCP/TLS connections
    • Chisel, a tool for tunneling network traffic over TCP/UDP
    • XMRig, a cryptocurrency miner 

    The agency said there is evidence suggesting that representatives of the Defense Forces of Ukraine may also have been targeted as part of the campaign. Thisis based on the distribution of malicious ZIP archives via Signal that are designed to drop AGINGFLY using the DLL side-loading technique.

    To mitigate the risk associated with the threat and minimize the attack surface, it’s recommended to restrict the execution of LNK, HTA, and JS files, along with legitimate utilities such as “mshta.exe,” “powershell.exe,” and “wscript.exe.”

    Campaign clinics DataTheft Government Malware Targets UAC0247 Ukrainian
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhy Your Search Data Doesn’t Agree (And What To Do About It)
    Next Article 4 reasons I use a 19-year-old app to copy and move files in Windows
    admin
    • Website

    Related Posts

    GitHub lays out copyright liability changes and upcoming DMCA review for developers

    April 16, 2026

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    April 16, 2026

    Capsule Security Emerges From Stealth With $7 Million in Funding

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google AI director outlines new content playbook

    April 16, 2026

    This 55-Inch LG OLED TV Is Nearly Half Off Right Now

    April 16, 2026

    4 reasons I use a 19-year-old app to copy and move files in Windows

    April 16, 2026

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,342)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (823)
    • Tech Tools & Mobile / Apps (1,606)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google AI director outlines new content playbook

    April 16, 2026

    This 55-Inch LG OLED TV Is Nearly Half Off Right Now

    April 16, 2026

    4 reasons I use a 19-year-old app to copy and move files in Windows

    April 16, 2026
    Most Popular
    • Google AI director outlines new content playbook
    • This 55-Inch LG OLED TV Is Nearly Half Off Right Now
    • 4 reasons I use a 19-year-old app to copy and move files in Windows
    • UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
    • Why Your Search Data Doesn’t Agree (And What To Do About It)
    • Opera’s browsers just picked up a new AI feature that’s actually useful
    • GitHub lays out copyright liability changes and upcoming DMCA review for developers
    • Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.