Threat Hunting & Intel

AgingFly campaign hits Ukrainian government and hospital networks

Lucas OliveiraLucas OliveiraResearch
April 16, 2026·5 min read
AgingFly campaign hits Ukrainian government and hospital networks

A newly reported campaign centered on the AgingFly backdoor is a reminder that targeted intrusions do not always depend on novel exploits. In this case, the more important story is operational flexibility. Public reporting says the activity hit local government entities and hospitals in Ukraine, with possible targeting of defense-related personnel as well, combining social engineering, browser data theft, messaging-app collection, and post-compromise tooling in one intrusion chain.

What makes AgingFly notable is not only that it is another piece of malware. It is that the operators appear comfortable blending commodity utilities, a staged loader chain, and dynamically compiled functionality to adapt their tradecraft once they gain a foothold. That is exactly the sort of campaign defenders should expect against pressured public-sector and healthcare environments.

What happened

According to BleepingComputer's summary of CERT-UA findings, the attack begins with spear-phishing emails disguised as humanitarian aid offers. Victims are lured into opening an archive that contains a shortcut file, which then abuses the Windows HTA handler to pull and execute additional code from a remote resource.

The chain then moves through multiple stages:

  • a decoy form to distract the user
  • scheduled-task persistence
  • a downloader and staged loader path
  • browser data theft from Chromium-based browsers
  • WhatsApp-for-Windows database extraction
  • reconnaissance and tunneling activity for follow-on access

The reporting attributes the activity to a cluster tracked as UAC-0247 and notes that the campaign relied on publicly available tools such as RustScan, Ligolo-ng, and Chisel alongside the custom payload.

Why AgingFly stands out

AgingFly reportedly provides remote command execution, file exfiltration, screenshot capture, and keylogging. But its most unusual feature is architectural. Rather than shipping every command handler inside the initial payload, the malware reportedly receives source code from its C2 and compiles functionality on the infected host at runtime.

That design offers several operational benefits to the attacker:

  • a smaller initial footprint
  • the ability to change capabilities on demand
  • less static logic for security tools to match early in the chain

It also creates defender implications. Runtime-compiled tasks can reduce the value of simple hash-based blocking and push analysts to rely more heavily on behavior, process ancestry, network telemetry, and memory-focused investigation.

Why this matters for defenders

The infection chain is full of familiar building blocks, but the target profile matters. Local governments and hospitals often operate under staffing pressure, legacy software constraints, and high service-availability demands. That makes them vulnerable to campaigns that prioritize access, persistence, and quiet data theft over noisy destructive actions.

The reported collection goals are also strategically important. Browser artifacts can expose session tokens, saved passwords, and cloud access. WhatsApp extraction can reveal contact graphs, message content, and operational coordination. Combined with reconnaissance and lateral movement tooling, that creates a path from one phished user to broader organizational visibility.

Defenders should also pay attention to the use of remote infrastructure and encrypted communications. BleepingComputer reports a TCP reverse shell stage, XOR-encrypted command traffic, and later WebSocket communications protected with AES-CBC. The campaign also uses Telegram as one mechanism for retrieving updated C2 information. That mix complicates static blocking and supports resilience if parts of the infrastructure are disrupted.

What to do now

1. Tighten controls around LNK, HTA, and script execution

CERT-UA's reported mitigation advice is practical. Blocking or heavily restricting LNK, HTA, and JS execution paths can break this campaign early.

2. Hunt for browser and messaging-data theft

Review hosts for unusual access to Chromium profile data, cookie stores, saved-password databases, and WhatsApp desktop data locations. Collection from those paths can be as important as classic document theft.

3. Watch for tunneling and staging utilities

Tools like Chisel, Ligolo-ng, and RustScan should stand out in many enterprise environments. Even when they are legitimate open-source tools, their appearance on government or hospital endpoints deserves urgent review.

4. Focus on behavior, not just malware signatures

Because AgingFly reportedly compiles some functionality on-host, defenders should prioritize process trees, PowerShell execution, scheduled tasks, remote-resource retrieval, and unusual compiler or runtime behavior after initial access.

5. Review communications and identity exposure together

A campaign that steals browser artifacts and messaging data can affect both technical access and operational communications. Incident response should account for credential resets, session revocation, and messaging-platform risk assessments, not only endpoint cleanup.

Strategic takeaway

AgingFly is a useful case study in how modern intrusion sets mix custom payloads with low-cost tooling and adaptable delivery chains. The lesson is not only about one malware family. It is about the value attackers get from stealing user context, establishing quiet persistence, and extending capability after compromise instead of front-loading everything in the first-stage payload.

For public-sector, healthcare, and other high-pressure environments, the defensive priority is to break the early execution chain, monitor for stealthy collection behavior, and treat browser plus messaging data as high-value targets during incident response.

What is AgingFly?

AgingFly is a malware family reportedly used in attacks against Ukrainian local governments and hospitals, providing remote access, data theft, keylogging, and flexible post-compromise capability.

How does the attack start?

Public reporting says the chain begins with spear-phishing emails that lead victims to malicious archives containing shortcut files and HTA-based execution stages.

Why is the malware's design notable?

Because some command handlers are reportedly compiled on the host from source code retrieved from the attacker infrastructure, which helps the operators adapt functionality during the intrusion.

What should defenders prioritize first?

Restrict LNK and HTA execution, investigate browser and WhatsApp data access, and hunt for tunneling tools, scheduled tasks, and suspicious follow-on activity.

References

  1. BleepingComputer: New AgingFly malware used in attacks on Ukraine govt, hospitals
  2. CERT-UA portal

Written by

Lucas Oliveira

Research

A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.