Ukrainian emergency services and hospitals hit by espionage campaign using new AgingFly malware
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户给的文章是关于乌克兰医院和政府机构受到黑客攻击的事件。首先,我要通读整篇文章,抓住主要信息。 文章提到黑客使用名为AgingFly的恶意软件,目标是乌克兰的医院和地方政府。CERT-UA指出攻击者是UAC-0247组织,过去两个月进行了多次攻击。攻击手段包括钓鱼邮件,伪装成讨论人道主义援助的提案,诱使受害者下载恶意文件。这些文件安装了多个恶意软件,包括AgingFly、SilentLoop等,能够远程控制计算机、窃取数据甚至挖矿。 此外,黑客还试图获取浏览器和WhatsApp账户的认证信息,并利用XMRig进行加密货币挖掘。CERT-UA警告称,乌克兰国防部队也可能成为目标。还有其他黑客组织如APT28(Fancy Bear)也参与了类似攻击,目标包括乌克兰检察官和邻国。 现在我需要将这些信息浓缩到100字以内。重点包括:黑客攻击乌克兰医院和政府机构、使用AgingFly恶意软件、通过钓鱼邮件传播、窃取数据和挖矿、以及涉及多个黑客组织。 最后,确保语言简洁明了,不使用“这篇文章”或“内容总结”这样的开头词。 </think> 乌克兰医院及地方政府遭黑客攻击,使用恶意软件AgingFly进行间谍活动及加密货币挖掘。攻击者通过伪装人道主义援助的钓鱼邮件传播恶意软件,并利用虚假网站或嵌入脚本增强可信度。该活动由UAC-0247组织实施,另 Fancy Bear 等团体亦参与针对乌执法机构的行动。 2026-4-16 12:4:38 Author: therecord.media(查看原文) 阅读量:20 收藏

Hackers have targeted Ukrainian hospitals and local government bodies in a new espionage campaign using a malware tool dubbed AgingFly, researchers say.

Ukraine’s computer emergency response team (CERT-UA) said the activity was carried out by a group tracked as UAC-0247, which launched multiple attacks over the past two months against municipal authorities, clinical hospitals and emergency medical services. 

The hackers attempted to steal sensitive data and, in some cases, exploit compromised systems to mine cryptocurrency, CERT-UA said.

The attacks typically began with phishing emails posing as discussions about proposals for humanitarian aid. Victims were asked to follow a link that led to the download of a malicious archive file.

To make the messages more convincing, attackers sometimes created websites for fake organizations — potentially generated using artificial intelligence — or embedded malicious scripts in otherwise legitimate websites.

Once opened, the archive installed multiple pieces of malware, including AgingFly, SilentLoop, ChromeElevator and ZapixDesk.

CERT-UA said AgingFly allows attackers to remotely control an infected computer, enabling them to execute commands, download files, capture screenshots, record keystrokes and run arbitrary code. Another tool, SilentLoop, can execute commands and retrieve the current address of the attackers’ command-and-control server via a Telegram channel.

The attackers also attempted to extract authentication credentials and other sensitive information from internet browsers using ChromeElevator, or from WhatsApp accounts using a tool called ZapixDesk.

In one case, investigators detected the use of XMRig, a legitimate cryptocurrency mining tool, suggesting attackers may have used victims’ computing resources to generate digital currency.

CERT-UA also warned that members of Ukraine’s Defense Forces could be targeted through similar tactics. In March, the agency received reports that attackers had distributed what they claimed was an updated software package for drone operators via the Signal messaging app. The archive file instead contained malware that installed AgingFly.

Earlier this week, Reuters reported that in a separate incident, Russia-linked hackers broke into more than 170 email accounts belonging to prosecutors and investigators in Ukraine, as well as targets in neighboring NATO countries and the Balkans. 

Cyber researchers at Ctrl-Alt-Intel attributed that campaign to the group known as APT28, also referred to as Fancy Bear, BlueDelta or Forest Blizzard.

Researchers said the hackers likely targeted Ukrainian law enforcement either to monitor investigations into Russian espionage activity or to gather potentially sensitive information about senior officials in Kyiv.

Recorded Future News contacted CERT-UA for additional comment on the Fancy Bear campaign but did not receive a response by the time of publication.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/aging-fly-espionage-campaign-targets-ukraine-emergency-services
如有侵权请联系:admin#unsafe.sh