A new wave of intrusions that has hit public agencies and health centres - especially clinics and emergency hospitals - again shows how attackers mix traditional techniques with modern tools to steal sensitive information. This has been alerted by the Ukrainian computer emergency response team, CERT-UA which has tracked the activity between March and April 2026 and linked it to a group identified as UAC-0247.
The starting point for these intrusions is apparently an emotional hook: emails that promise humanitarian aid and contain a link. This link can lead to a legitimate website committed through a cross-site scribing (XSS) vulnerability or a false portal made with the assistance of artificial intelligence tools. The real intention, in any case, is to induce the recipient to download a direct access to Windows (LNK file) which, when activated, launches an HTML application (HTA) through the native utility mshta.exe. This running flow takes advantage of valid system features to run malicious code without raising immediate suspicion.

While the HTA window shows a form or a decoy to distract the user, in the background an executable is downloaded to inject code into a legitimate system process (e.g., runtimeBroker.exe). In some of the analyzed intrusions, a two-stage charger with a second module using an owner executable format, with support for code and data sections, import of functions and relocations, has been observed; in addition, the final payload arrives compressed and encrypted to make it difficult to detect and analyse.
The identified components include a TCP-based reverse shell known as RAVENSHELL or equivalent variants, which opens a connection to a command and control server to receive instructions and run commands by cmd.ex. Tools built in .NET have also been downloaded, such as a family with the name AGINGFLY that acts as a backdoor and communicates with its C2 by WebSockets. A PowerShell script called SILENTLOOP appears as a facilitator: it manages the execution of orders, updates settings and gets the command server address from a Telegram channel, using alternative methods in case of failure.
The final objective described by the researchers was the internal exploration of the attacked networks, the lateral movement between systems and, especially, the extraction of credentials and sensitive data stored in Chromium-based browsers and in WhatsApp Web. To achieve this, operators used several open source utilities that allow, for example, to avoid certain Chromium protections to access cookies and saved passwords, extract and decrypt local WhatsApp Web databases and develop tunnels from within the committed network to exfilter information or receive additional instructions.
Tools such as Chisel and other tunneling solutions, which have public repositories and legitimate use in administration and testing, were reused by attackers to pivote and maintain persistent communication channels. RustScan is mentioned as an example of network scanner that facilitates recognition, and in some incidents even cryptomoneda mining software was detected in the engaged teams, indicating a combination of objectives: from espionage to direct monetization of access.
Another relevant aspect of the pattern is the distribution addressed to certain collectives through encrypted messaging. CERT-UA detected malicious Signal shipments containing ZIP files prepared to deploy AGINGFLY using the technique known as side-loading from DLL, a way to trick legitimate applications into loading manipulated libraries. This evidence suggests that, in addition to civilian institutions, representatives of the Ukrainian Defence Forces may also have been targeted.
To understand the operational dimension of the threat, it is appropriate to refer to technical sources on each of the elements that appear in the attack. The abuse of legitimate profits of the system, such as mshta.exe o PowerShell, is a pattern known and documented by manufacturers and security equipment because it allows attackers to run almost invisible loads within reliable processes. The above-mentioned tunneling and scanning tools, with public projects on platforms such as GitHub, can be consulted to understand how legitimate resources are reinterpreted for malicious purposes; for example, the Chisel project is available in its official repository in GitHub and RustScan can be consulted at your repository. The presence of miners like XMRig is also easy to verify on your official website xmrig.com.
What practical lessons does this case leave? The first is that effective campaigns combine social engineering with abuse of legitimate system functionalities, which requires controls both on the perimeter and inside the network. Limit the ability to run NK shortcuts, HTA applications and JS scripts, and control the use of administration utilities such as mshta.exe, powershell.exe or wscript.exe reduces attack surfaces and forces the attacker to use more noisy or complex methods to achieve persistence. Also, monitoring unusual outgoing connections, reviewing critical process integrity and blocking unknown payloads in mail accounts and messaging applications are complementary measures.

At the organizational level, early notification and sharing of commitment indicators between security agencies and providers accelerates detection and response. Response groups such as CERT-UA publish warnings and analyses that serve to coordinate mitigation; their portal can be consulted at cert.gov.ua. And for technical and security-responsible equipment, it is recommended to review the mitigation guides and the policies for blocking the execution of unsigned files or dangerous file types, as well as to apply segmentation and minimum access controls to limit the scope of an intrusion.
In short, this campaign is a reminder that the combination of credible lures, the exploitation of legitimate websites (or of pages generated by IA) and the use of administrative tools of the system itself remains an effective formula for resource actors. The defence is to reduce the exposure windows by applying technical controls, security policies and training so that staff do not fall into the initial bait.
To expand the information with technical analysis and recommendations, in addition to consulting the official communication of CERT-UA, it is useful to review documentation and alerts on the abuse of Windows utilities and side-loading techniques published by manufacturers and response centres, as well as the pages and repositories of the above-mentioned tools.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...