{"id":613,"date":"2026-04-16T07:40:31","date_gmt":"2026-04-16T07:40:31","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=613"},"modified":"2026-04-16T07:40:31","modified_gmt":"2026-04-16T07:40:31","slug":"uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=613","title":{"rendered":"UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 16, 2026<\/span><\/span><span class=\"p-tags\">Malware \/ Threat Intelligence<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhH3uHu3ez1qUhePM8e1rCVaEUwBzhu09tblZcAl6jlOEYHN1Zq2-rm-dyEOArGNUm63UjM-_Qs8XwFKUa46UxOwufTn4BmRlfv1xiwlxkk3XboMQu8d4fHpy5Vb5y_0zcpXw5Alg-V_Ud85gINtfz6pfOZWWcco9Dy0jkeRCPCF-ssY2zJjRge1d3PJf_c\/s1700-e365\/uk.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>The Computer Emergencies Response Team of Ukraine (CERT-UA)\u00a0has <a href=\"https:\/\/cert.gov.ua\/article\/6288271\">disclosed<\/a> details of a new\u00a0campaign that has\u00a0targeted governments and municipal healthcare institutions, mainly clinics and emergency hospitals, to deliver malware capable of stealing sensitive data from Chromium-based web browsers and\u00a0WhatsApp.<\/p>\n<p>The activity,\u00a0which was\u00a0observed between March and April 2026, has been attributed to a threat cluster\u00a0dubbed <strong>UAC-0247<\/strong>. The\u00a0origins of the campaign are presently\u00a0unknown.<\/p>\n<p>According to CERT-UA, the starting point of the attack chain is an email message claiming to be a humanitarian aid proposal, urging recipients to click on a link that redirects to either a legitimate website compromised via a cross-site scripting (XSS) vulnerability or a bogus site created with help from artificial intelligence (AI)\u00a0tools.<\/p>\n<p>Regardless\u00a0of what the\u00a0site is, the goal is to download and run a Windows Shortcut (LNK) file, which then executes a remote HTML Application (HTA) using the native Windows\u00a0utility, \u00abmshta.exe.\u00bbThe HTA file, for its part, displays a decoy form to divert the victim&#8217;s\u00a0attention, while simultaneously fetching a\u00a0binary responsible for\u00a0injecting shellcode into a legitimate process (e.g., \u00abruntimeBroker.exe\u00bb).<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>\u00abAt the same time, recent campaigns have recorded the use of a two-stage loader, the second stage of\u00a0which is implemented using a proprietary executable file format (with full support for code and data sections, import of functions from dynamic libraries, and relocation), and the final payload is additionally compressed and encrypted,\u00bb CERT-UA\u00a0said.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ai-blindspot-d-2\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXdwBgwvGAvD2t1bXXwTy6zsfnReMp12VglYCBAv0j9Tc0_gLKPqF5HJO1kOv26ZcGRlQJ1kRXGvtIusmtnUGUjonzq8YEigkMhMJvk_Cta9TYHzMvqVfa5SvoH-Z9-kw5VEH8sPeI1YKKrzFeNYp0Cn7mEGMn6PXOs0waZDIWKI5nccOxPyJR8MDQMasu\/s728-e100\/nudge-d-2.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>One of the stagers is a tool called TCP reverse shell or its equivalent, tracked as RAVENSHELL, which establishes a TCP connection with a management server to receive\u00a0commands for\u00a0execution on the host using \u00abcmd.exe.\u00bb<\/p>\n<p>Also downloaded to the infected machine is a malware family dubbed AGINGFLY and a PowerShell script referred to as SILENTLOOP that comes with several functions to execute commands, auto-update configuration, and obtain the current IP address of the management server from a Telegram channel, and fall back to alternative mechanisms for determining the command-and-control (C2)\u00a0address.<\/p>\n<p>Developed using C#,\u00a0AGINGFLY is engineered to provide remote control of the affected systems. It\u00a0communicates with a C2 server using WebSockets to fetch commands that allow it to run commands, launch a keylogger, download files, and run additional\u00a0payloads.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_AHxWvDP44pLmXPdXa6YmuE1wb3CQljkIyHsvoDvvrqtUqEWpVdPYIwuug_YS18uDgDZfmuRi7Tam4qe1fGip8uwznKiv2JBtGxvGwgUugwJga-tCkmZVHmc-OcBjbmaVeDP3kohvXHjm82n0UcP7BEngOpkSksnp05M0FVjtbxsbrd86os2-pyfHCamQ\/s1700-e365\/ua-2.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_AHxWvDP44pLmXPdXa6YmuE1wb3CQljkIyHsvoDvvrqtUqEWpVdPYIwuug_YS18uDgDZfmuRi7Tam4qe1fGip8uwznKiv2JBtGxvGwgUugwJga-tCkmZVHmc-OcBjbmaVeDP3kohvXHjm82n0UcP7BEngOpkSksnp05M0FVjtbxsbrd86os2-pyfHCamQ\/s1700-e365\/ua-2.png\" alt=\"\" border=\"0\" data-original-height=\"1792\" data-original-width=\"3194\"\/><\/a><\/div>\n<p>An investigation of about a dozen incidents has revealed that these attacks facilitate reconnaissance, lateral movement, and the theft of credentials and other sensitive data from WhatsApp and Chromium-based\u00a0browsers. Thisis accomplished by deploying various open-source tools, such as those listed below\u00a0&#8211;<\/p>\n<ul>\n<li>ChromElevator, a program designed to bypass Chromium&#8217;s app-bound encryption (ABE) protections and harvest cookies and saved passwords<\/li>\n<li><a href=\"https:\/\/github.com\/kraftdenker\/ZAPiXDESK\">ZAPiXDESK<\/a>, a forensic extraction tool to decrypt local databases for WhatsApp Web<\/li>\n<li><a href=\"https:\/\/github.com\/bee-san\/RustScan\">RustScan<\/a>, a network scanner<\/li>\n<li>Ligolo-Ng, a lightweight utility to establish tunnels from reverse TCP\/TLS connections<\/li>\n<li><a href=\"https:\/\/github.com\/jpillora\/chisel\">Chisel<\/a>, a tool for tunneling network traffic over TCP\/UDP<\/li>\n<li>XMRig, a cryptocurrency miner\u00a0<\/li>\n<\/ul>\n<p>The agency said there is evidence suggesting that representatives of the Defense Forces of Ukraine may also\u00a0have been\u00a0targeted as part of the\u00a0campaign. Thisis\u00a0based on the distribution of malicious ZIP archives via Signal\u00a0that are\u00a0designed to drop AGINGFLY using the DLL side-loading technique.<\/p>\n<p>To mitigate the risk associated with the threat and minimize the attack\u00a0surface, it&#8217;s recommended to restrict the execution of LNK, HTA, and JS\u00a0files, along\u00a0with legitimate utilities such as \u00abmshta.exe,\u00bb \u00abpowershell.exe,\u00bb and \u00abwscript.exe.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 16, 2026Malware \/ Threat Intelligence The Computer Emergencies Response Team of Ukraine (CERT-UA)\u00a0has disclosed details of a new\u00a0campaign that has\u00a0targeted governments and municipal healthcare institutions, mainly clinics and&hellip;<\/p>\n","protected":false},"author":1,"featured_media":614,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[6,1236,1237,385,42,78,1235,244],"class_list":["post-613","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-campaign","tag-clinics","tag-datatheft","tag-government","tag-malware","tag-targets","tag-uac0247","tag-ukrainian"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=613"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/613\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/614"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}