HomeTopics 1AI & CybersecurityHumanitarian Aid Turned Weapon: UAC-0247 Cyberattacks Target Hospitals and Public Sector in...

Humanitarian Aid Turned Weapon: UAC-0247 Cyberattacks Target Hospitals and Public Sector in Sophisticated Multi-Stage Campaign

Date:

Related stories

SAP Patch Day Alert: Critical SQL Injection Flaw (CVSS 9.9) Demands Immediate Action

SAP customers worldwide are facing a high-risk security moment...

Social Media Ban Fails? Over 60% of Under-16s Still Active Online, Study Reveals

Efforts to restrict children’s access to social media are...

Hack-for-Hire Espionage Exposed: BITTER-Linked Campaign Targets Civil Society with Mobile Spyware

A sophisticated hack-for-hire cyber espionage campaign targeting journalists, opposition...
spot_imgspot_imgspot_imgspot_img

A new wave of highly targeted cyberattacks is putting hospitals, local governments, and even defense-linked operators at risk leveraging deception, advanced malware, and stealthy persistence techniques.

According to insights published by Ukraine’s national cyber response team CERT-UA, the threat cluster tracked as UAC-0247 has intensified operations between March and April 2026, signaling a dangerous evolution in socially engineered cyber warfare.

The campaign begins innocently enough: an email discussing humanitarian aid. But behind the façade lies a carefully orchestrated attack chain designed to infiltrate critical institutions.

Attackers lure victims into clicking malicious links, often backed by AI-generated fake websites or scripts injected into legitimate – but vulnerable – web platforms via Cross-Site Scripting. Once clicked, victims unknowingly download weaponized archives containing shortcut files that trigger multi-stage malware execution.

This isn’t opportunistic cybercrime it’s targeted, persistent, and engineered for deep system compromise.

Inside the Attack Chain: A Technical Breakdown

The infection process reflects a high level of sophistication:

  • Initial Payload: Malicious .LNK files trigger execution via native Windows tools like mshta.exe
  • Stage Execution: Remote HTA files deploy decoy forms while silently installing malware
  • Persistence: Scheduled tasks ensure repeated execution and system foothold
  • Payload Delivery:
    • AGINGFLY – Remote control, keylogging, file exfiltration
    • SILENTLOOP – Dynamic C2 communication via Telegram
    • RAVENSHELL – Encrypted command execution channel

What makes this campaign particularly dangerous is the modular execution model: attackers dynamically compile malicious code on infected systems, reducing detection by traditional security tools.

Expanding Targets: From Hospitals to FPV Operators

While early attacks focused on healthcare institutions and municipal authorities, newer incidents reveal expansion toward defense-related personnel, including drone (FPV) operators.

In one case, attackers distributed a trojanized version of a tool named “BACHU” via the messaging platform Signal. Using DLL side-loading, the malware silently deployed AGINGFLY—turning trusted software into a cyber weapon.

Post-Exploitation Capabilities

Once inside a network, attackers move quickly:

  • Credential theft from browsers using tools like CHROMELEVATOR
  • Data extraction from messaging platforms like WhatsApp (via ZAPIXDESK)
  • Network reconnaissance using tools such as RUSTSCAN
  • Lateral movement and tunneling using LIGOLO-NG and CHISEL
  • Even cryptomining activity via XMRIG, disguised within legitimate software like WireGuard

This blend of espionage, persistence, and monetization highlights a hybrid threat model.

Global Implications

Although the campaign is regionally focused, its tactics are globally relevant. The abuse of humanitarian narratives, combined with living-off-the-land techniques and AI-generated deception, signals a broader shift in cyberattack strategies.

Organizations worldwide—especially in healthcare, government, and critical infrastructure—should treat this as a warning.

10 Critical Security Recommendations

To defend against campaigns like UAC-0247, security teams should act immediately:

  1. Block execution of LNK, HTA, and JS files across endpoints
  2. Restrict use of native tools like mshta.exe, powershell.exe, and wscript.exe
  3. Deploy advanced email filtering to detect phishing and spoofed domains
  4. Implement endpoint detection & response (EDR) solutions
  5. Monitor abnormal scheduled task creation
  6. Enforce least privilege access across systems
  7. Inspect outbound traffic for unusual encrypted connections
  8. Use threat intelligence feeds to block known indicators (IOCs)
  9. Regularly patch systems to prevent XSS and web-based exploits
  10. Conduct continuous employee awareness training via Saintynet Cybersecurity

For deeper protection strategies, explore enterprise-grade solutions at Saintynet Cybersecurity and stay updated with threat intelligence insights on Cybercory.

Expert Insight

This campaign demonstrates how attackers are blending social engineering, legitimate tools, and modular malware to evade detection. The use of Telegram for command-and-control and dynamic payload compilation suggests a move toward resilient, adaptive cyber operations.

Conclusion

The UAC-0247 campaign is a stark reminder that modern cyber threats are no longer just technical they are psychological, strategic, and deeply deceptive. By exploiting trust, especially in humanitarian contexts, attackers are raising the stakes.

Organizations must respond with equal sophistication combining technology, awareness, and proactive defense.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img