Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cyber Campaign Targets Ukrainian Health and Government

Cyber Campaign Targets Ukrainian Health and Government

Posted on April 16, 2026 By CWS

The Computer Emergencies Response Team of Ukraine (CERT-UA) has reported a new cyber campaign that primarily targets government bodies and municipal healthcare facilities, including clinics and emergency hospitals. This campaign, active from March to April 2026, is linked to a group identified as UAC-0247. The origins of this campaign remain unidentified, but its impact has been significant, particularly in data theft from Chromium-based web browsers and WhatsApp.

Phishing Tactics and Malware Deployment

The attack initiates through phishing emails masquerading as humanitarian aid proposals. These emails contain links that lead recipients to either compromised legitimate websites or fake sites crafted using AI technologies. The objective is to download a Windows Shortcut (LNK) file, which subsequently executes a remote HTML Application (HTA) using Windows’ “mshta.exe” utility. This HTA file serves as a distraction while a malicious binary injects shellcode into legitimate processes like “runtimeBroker.exe.”

Recent observations note the use of a two-stage loader in these attacks. The second stage involves a proprietary executable format, which supports comprehensive code functionality and uses encryption to secure the final payload. This sophisticated approach underscores the advanced nature of the threat.

Malware Tools and Network Intrusion

Among the tools used in this campaign is RAVENSHELL, a TCP reverse shell that establishes a connection with a command server to execute directives on the targeted system. Additionally, the malware AGINGFLY, developed in C#, is installed to facilitate remote control over infected systems via WebSockets. It can execute commands, operate a keylogger, and deploy further malware.

Complementing AGINGFLY, a PowerShell script called SILENTLOOP is also used. This script carries multiple functionalities, including command execution and configuration updates, and retrieves the IP address of the management server from a Telegram channel.

Tools for Data Extraction and Security Measures

The investigation into this cyber activity revealed the deployment of various open-source tools such as ChromElevator and ZAPiXDESK for extracting data from browsers and WhatsApp, respectively. Network scanning and tunneling utilities like RustScan and Ligolo-Ng were also employed to facilitate the attack’s progression.

Furthermore, evidence suggests that members of Ukraine’s Defense Forces may have been targeted through malicious ZIP archives distributed via Signal, which used DLL side-loading to drop AGINGFLY.

To mitigate this threat, CERT-UA recommends restricting the execution of LNK, HTA, and JS files, along with utilities like “mshta.exe,” “powershell.exe,” and “wscript.exe.” These measures are crucial to reducing the attack surface and preventing further exploitation.

This campaign highlights the persistent and evolving nature of cyber threats targeting critical sectors, underscoring the need for enhanced cybersecurity measures and constant vigilance.

The Hacker News Tags:AGINGFLY, C2 servers, CERT-UA, Chromium browsers, Cybersecurity, data theft, healthcare security, malware campaign, network security, RAVENSHELL, SILENTLOOP, threat intelligence, UAC-0247, Ukrainian cyber attack, WhatsApp

Post navigation

Previous Post: AI-Driven Threat Exploits Google Discover to Spread Malware
Next Post: Malicious Adobe Reader Download Conceals Remote Access Threat

Related Posts

15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign 15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign The Hacker News
Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More The Hacker News
Cline CLI Supply Chain Breach Installs OpenClaw Cline CLI Supply Chain Breach Installs OpenClaw The Hacker News
ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services The Hacker News
Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild The Hacker News
Google Patches Chrome Zero-Day Vulnerabilities in Skia and V8 Google Patches Chrome Zero-Day Vulnerabilities in Skia and V8 The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ZionSiphon Malware Targets Israeli Water Systems
  • NIST Adopts Risk-Based Approach Amid Rising CVE Submissions
  • Hackers Struggle with TP-Link Router Vulnerability
  • Vercel Data Breach Linked to Context AI Compromise
  • Flowise Vulnerability Exposes Millions to Remote Code Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ZionSiphon Malware Targets Israeli Water Systems
  • NIST Adopts Risk-Based Approach Amid Rising CVE Submissions
  • Hackers Struggle with TP-Link Router Vulnerability
  • Vercel Data Breach Linked to Context AI Compromise
  • Flowise Vulnerability Exposes Millions to Remote Code Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark