Ukraine's incident response teams recently identified a new malware family that have baptized as AgingFly, deployed in campaigns directed against local authorities and health centres. According to the public report of CERT-UA, intrusions not only sought institutional information: forensic evidence suggests that there were also attempts to engage personnel associated with the Defence Forces.
The entry point is classic but effective: an email message that simulates a humanitarian aid offer and includes a link for "more information." This link can lead to a legitimate site that was previously violated by cross-site scribing (XSS) or a fake page created by artificial intelligence tools. The aim is to induce the user to download a compressed file containing a direct access (LNK) that, when activated, invokes the Windows-integrated HTA handler.

The HTA file is downloaded and run from a remote resource, displays a distraction form to avoid raising suspicions and creates a scheduled task whose purpose is to recover and launch an executable. This EXE injects shellcode in a legitimate process and gives way to a two-stage charger: the second phase uses a custom executable format and the final payload arrives compressed and encrypted.
To establish communication with their operators, attackers have used "staging" techniques: TCP-based reverse shell stackers (CERT-UA mentions RAVENSHELL equivalents) and an encrypted channel with XOR to a command and control server (C2) to run commands through the Windows command interpreter. In addition, operators use a PowerShell script called SILENTLOOP that controls the execution of orders, updates configurations and obtains the C2 address from a Telegram channel or by booking mechanisms.
The final load, AgingFly, is written in C # and provides remote control, command execution, file exfiltration, screen capture, key log and the ability to run arbitrary code. A relevant particularity is that malware does not store its command handlers internally: instead of including them, it recovers them as source code from the C2 server and compiles them to the victim machine in running time. As the CERT-UA This strategy reduces the size of the initial payload and allows the attackers to modify or expand functionalities on demand, although at the cost of depending on the connectivity to the C2 and increasing the footprint in time of execution.
In several of the analyzed intrusions, the responsible also removed credentials and navigation data. They took advantage of open source forensic tools that could extract and decipher information stored by Chromium-based browsers, such as cookies and saved passwords, without administrative privileges. Similarly, they tried to recover data from the WhatsApp application for Windows through utilities that allow you to decipher your local databases.
The actor behind these operations was not limited to the theft of credentials: he carried out reconnaissance and lateral movement activities within the committed networks. For these phases it used well-known public tools in the community, including port scanners and tunneling solutions that facilitate access and reshipment of traffic to servers outside the target network. Public repositories such as RustScan, ligolo-ng and gossip are examples of projects that, although legitimate, can be used for these purposes in the hands of malicious actors.
CERT-UA has attributed these campaigns to a cluster of threats that they record as UAC-0247 and has published technical indications and mitigation. These include an explicit recommendation to block the execution of LNK, HTA and JS files as a measure to interrupt the attack chain used by these operators.

Beyond blocking file types, there are practical measures that reduce risk: activate multifactor authentication in all accounts, rotate exposed passwords, limit local privileges, review and restrict programmed tasks, monitor unusual outgoing connections and use EDR solutions that detect process injections or dynamic compilations. Organizations should also strengthen e-mail hygiene with link and sandboxing filtering, and maintain awareness-raising programmes for staff to identify signs as help offers or unexpected compressed files.
If you are looking for references to deepen, you can read the CERT-UA technical notice where indicators and tactics are detailed: CERT-UA: AgingFly report. For mitigation guides and applicable rules in Windows environments it is appropriate to review Microsoft's documentation on attack surface reduction and ASR rules, which allow to block the execution of dangerous file types: Microsoft Defender - Attack Surface Reduction. And for best practices against phishing, the CISA agency maintains practical recommendations and training resources: CISA - Safety Tips and alerts.
The case of AgingFly recalls two important lessons: the first, that many chains of intrusion begin with very simple social engineering techniques; the second, that legitimate open source developments and management tools can be reused by attackers for purposes of espionage or sabotage. In this context, the combination of technical controls, continuous visibility and staff training remains the most effective defence for organizations with sensitive profiles such as local governments and hospitals.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...