Posted in

UAC-0247 Cyberattack Targets Hospitals via Browser & WhatsApp Theft

Healthcare systems and government institutions are increasingly becoming prime targets for advanced cyber espionage groups. A recent campaign attributed to UAC-0247 has triggered serious concern after targeting hospitals and municipal agencies across Ukraine, focusing on stealing sensitive browser credentials and WhatsApp communications.

Between March and April 2026, the group launched a highly coordinated attack chain combining phishing emails, fake humanitarian portals, and multi-stage malware deployment designed for stealth and persistence.

For cybersecurity teams, this campaign reinforces a critical reality:
👉 Modern attackers don’t just breach systems—they infiltrate communication channels and extract identity-level data.

In this article, you’ll learn:

  • How UAC-0247 attacks hospitals and governments
  • The malware chain behind browser and WhatsApp data theft
  • Real-world tools used in the campaign
  • Risks to critical infrastructure
  • Best practices to defend against similar threats

What Is the UAC-0247 Attack Campaign?

Overview of the Threat Group

UAC-0247 is an advanced threat actor conducting targeted cyberattacks against:

  • Hospitals and clinical infrastructure
  • Municipal and government agencies
  • Defense-related organizations

Primary Objectives

The campaign focuses on:

  • Credential theft from browsers
  • WhatsApp data extraction
  • Lateral movement inside networks
  • Long-term persistence

How the Attack Works

Step-by-Step Infection Chain

  1. Phishing Email Delivery
    • Disguised as humanitarian aid proposals
    • Targets hospital and government staff
  2. Malicious Link Clicked
    • Redirects to compromised legitimate websites
    • Some pages use AI-generated fake portals
  3. Payload Download
    • Victim downloads a compressed archive
    • Contains malicious LNK shortcut file
  4. Execution Chain Triggered
    • LNK file launches HTA script
    • Decoy form displayed to avoid suspicion
    • Scheduled task executes payload
  5. System Compromise
    • Shellcode injected into RuntimeBroker.exe

Inside the Malware Toolset

Browser Credential Theft – CHROMELEVATOR

This tool:

  • Extracts saved credentials from Chromium-based browsers
  • Bypasses built-in browser protections
  • Harvests authentication data silently

WhatsApp Data Extraction – ZAPIXDESK

  • Decrypts local WhatsApp Web databases
  • Extracts private chats and session data
  • Targets healthcare and government communication

Network Reconnaissance Tools

Attackers use:

  • RUSTSCAN → Subnet discovery
  • LIGOLO-NG → Reverse tunneling
  • CHISEL → Encrypted network pivoting

Advanced Persistence Techniques

DLL Side-Loading Attacks

  • Malware hides inside legitimate applications
  • Example: modified WIREGUARD client
  • Loads malicious DLL at runtime

Backdoor Deployment

  • AGINGFLY backdoor installed via DLL injection
  • Enables remote access and control

Cryptocurrency Mining Abuse

  • XMRIG miner deployed in some cases
  • Runs hidden within compromised systems

Targeting Critical Infrastructure

Healthcare Sector Risk

Hospitals are heavily impacted due to:

  • High-value patient data
  • Emergency system dependency
  • Limited downtime tolerance

Government Targeting

Municipal systems are attacked for:

  • Identity data
  • Administrative access
  • Internal communications

Military Targeting

CERT-UA also reported:

  • Fake drone software updates (“BACHU”)
  • Delivered via Signal messaging
  • Used to deploy AGINGFLY backdoor

Why This Attack Is Highly Dangerous

1. Multi-Layer Infection Chain

Combines phishing, XSS, HTA, and scheduled tasks.


2. Cross-Platform Data Theft

Targets:

  • Browsers
  • Messaging apps
  • System credentials

3. Living-off-the-Land Techniques

Abuses legitimate tools like:

  • PowerShell
  • mshta.exe
  • wscript.exe

4. AI-Generated Deception

Fake websites built using AI increase trust and credibility.


Common Mistakes That Enable These Attacks

1. Trusting External Links in Emails

Especially those referencing humanitarian or urgent topics.


2. Allowing Execution of Script Files

LNK and HTA files are commonly overlooked.


3. Weak Endpoint Monitoring

Credential theft often goes undetected.


4. Overexposure of Messaging Platforms

WhatsApp Web and Telegram are often unsecured in enterprise environments.


Best Practices to Defend Against UAC-0247

Immediate Security Controls

  • Block execution of:
    • .LNK files
    • .HTA scripts
    • .JS files

System Hardening

  • Restrict or disable:
    • mshta.exe
    • powershell.exe
    • wscript.exe

Network Monitoring

  • Detect unusual outbound traffic
  • Monitor Telegram channel connections
  • Identify unknown IP communications

Endpoint Protection

  • Detect DLL side-loading attempts
  • Monitor credential dumping behavior
  • Enforce application control policies

Expert Security Insights

Healthcare Is a Prime Target

Because of:

  • Sensitive patient data
  • Operational urgency
  • Legacy system exposure

Credential Theft Is the Real Goal

Attackers are no longer just deploying ransomware—they are:

👉 Extracting long-term access credentials


AI Is Accelerating Deception

Fake portals and emails are increasingly AI-generated, making phishing harder to detect.


Framework Mapping

MITRE ATT&CK

TacticTechnique
Initial AccessPhishing Link
ExecutionLNK / HTA Execution
PersistenceScheduled Task
Credential AccessBrowser Credential Dumping
ExfiltrationEncrypted Channels
Defense EvasionDLL Side-Loading

NIST Cybersecurity Framework

  • Identify healthcare and government assets
  • Protect endpoints and email systems
  • Detect abnormal execution chains
  • Respond to credential theft incidents
  • Recover compromised systems

FAQs

1. What is the UAC-0247 campaign?

A cyberattack targeting hospitals and governments to steal browser and WhatsApp data using multi-stage malware.


2. What data is being stolen?

  • Browser credentials
  • WhatsApp messages
  • System authentication data

3. How does the attack start?

Through phishing emails disguised as humanitarian aid messages.


4. Which industries are targeted?

Healthcare, government, and defense organizations.


5. What tools do attackers use?

CHROMELEVATOR, ZAPIXDESK, RUSTSCAN, CHISEL, and LIGOLO-NG.


6. How can organizations defend themselves?

By blocking script execution, hardening endpoints, and monitoring network anomalies.


Conclusion

The UAC-0247 cyberattack campaign highlights a dangerous evolution in modern cyber warfare:

👉 Attackers are no longer just breaking into systems—they are extracting communication identity and operational trust.

By combining phishing, malware chaining, and advanced lateral movement tools, the group demonstrates how quickly critical infrastructure can be compromised.

Key takeaway:
Defending healthcare and government systems requires more than perimeter security—it demands behavioral detection, strict execution control, and continuous monitoring.

Now is the time to:

  • Restrict risky file execution
  • Strengthen endpoint visibility
  • Monitor credential theft patterns

👉 Because in modern cyberattacks, the first click often becomes the point of full compromise.

Leave a Reply

Your email address will not be published. Required fields are marked *