• Home
  • About
  • Locations
logologologologo
  • Plan
    • vCISO
    • Policies & Procedures
    • Strategy & Security Program Creation
    • Risk Management
  • Attack
    • Penetration Testing
    • PTaaS
    • Red Teaming
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • IOT Penetration Testing
  • Defend
    • Office 365 Security
    • HIPAA Compliance
    • PCI Compliance
    • Code Reviews
    • Blockchain Security Analysis
    • Vulnerability Assessments
  • Recover
    • Ransomware Recovery
    • Expert Witness
    • Forensics
  • Learn
    • Resources
    • Penetration Testing Training
    • Blog
  • Contact Us
  • Instant Quote
✕

UAC-0247 Cyber Campaign Steals Browser Credentials and WhatsApp Data

April 16, 2026

Meta Description
The UAC-0247 cyber campaign targets government and healthcare sectors, stealing browser credentials and WhatsApp data using advanced malware. This analysis explains how the attack works and what organizations must do now.


Introduction

Modern cyber espionage campaigns are increasingly focused on data extraction rather than disruption. Instead of deploying ransomware or destructive payloads, attackers are quietly infiltrating systems to harvest credentials, communications, and sensitive operational data.

A newly uncovered campaign attributed to UAC-0247 reflects this shift. Targeting government agencies and healthcare institutions, this operation combines phishing, multi-stage malware, and specialized data extraction tools to conduct large-scale surveillance and intelligence gathering.

What makes this campaign particularly dangerous is its ability to operate silently within legitimate processes while extracting highly sensitive data from browsers and messaging platforms like WhatsApp.


What Happened

Ukraine’s national CERT (CERT-UA) disclosed a coordinated cyber campaign active between March and April 2026, targeting:

  • Government organizations
  • Municipal healthcare institutions
  • Emergency hospitals

The attackers deployed malware specifically designed to:

  • Steal data from Chromium-based browsers
  • Extract information from WhatsApp desktop applications

The origin of the threat actor remains unclear, but the campaign shows signs of a well-organized espionage operation.


Why This Attack Is Different

This campaign is not focused on immediate impact, it is designed for:

  • Long-term access
  • Credential harvesting
  • Intelligence gathering

Unlike traditional attacks, UAC-0247:

  • Uses multi-stage loaders and custom malware formats
  • Blends into legitimate system processes
  • Prioritizes stealth and persistence over speed

This makes detection significantly more difficult and allows attackers to remain inside networks for extended periods.


How the Attack Chain Works

The UAC-0247 campaign follows a multi-stage infection chain.

Phishing Email Delivery

Victims receive emails disguised as humanitarian aid proposals, encouraging them to click malicious links.

Malicious Website Redirection

Links redirect to:

  • Compromised legitimate websites (via XSS)
  • Fake sites generated using AI tools

LNK File Execution

A ZIP archive is downloaded containing a malicious shortcut (LNK) file, which triggers execution when opened.

HTA Payload Execution

The LNK file launches mshta.exe, which executes a remote HTML Application (HTA) while displaying a decoy form.

Payload Deployment and Injection

A secondary payload injects shellcode into legitimate processes such as runtimeBroker.exe, allowing stealth execution.

Command and Control Communication

The malware establishes communication with attacker infrastructure using:

  • WebSockets
  • TCP reverse shells
  • Telegram-based fallback mechanisms

Understanding AGINGFLY Malware

At the core of this campaign is a custom backdoor called AGINGFLY.

This malware:

  • Is written in C#
  • Provides full remote control over infected systems
  • Supports modular functionality and dynamic updates

Capabilities include:

  • Command execution
  • Keylogging
  • File exfiltration
  • Screenshot capture
  • Deployment of additional payloads

Its modular design allows attackers to adapt behavior in real time, making it highly flexible and difficult to analyze.


How Data Is Stolen

The primary goal of this campaign is data exfiltration.

Attackers use specialized tools such as:

ChromElevator

  • Extracts cookies and saved credentials
  • Bypasses Chromium browser encryption protections

ZAPiXDESK

  • Decrypts WhatsApp desktop databases
  • Extracts sensitive communication data

These tools allow attackers to gain access to:

  • Login credentials
  • Session tokens
  • Private communications

Common Techniques Used in the Campaign

The UAC-0247 operation combines multiple advanced techniques.

Phishing and Social Engineering

Humanitarian-themed emails increase user trust.

Living-Off-the-Land Techniques

Abuse of legitimate tools such as:

  • mshta.exe
  • PowerShell
  • wscript.exe

Fileless Execution

Payloads are executed in memory to avoid detection.

Credential Harvesting

Browser and messaging data are extracted using specialized tools.

Lateral Movement and Reconnaissance

Tools like RustScan and tunneling utilities enable network expansion.

Encrypted Command and Control

Multiple communication channels ensure resilience.


Why This Campaign Is Dangerous

This campaign introduces several critical risks.

Stealthy Operation

Malware runs within legitimate processes, avoiding detection.

High-Value Data Targeting

Focus on credentials and communications rather than disruption.

Multi-Stage Architecture

Layered payloads make analysis and response difficult.

Resilient Infrastructure

Fallback C2 mechanisms ensure persistence.

Because the attack prioritizes data over visibility, organizations may remain compromised without realizing it.


Who Is Being Targeted

The campaign primarily targets:

  • Government agencies
  • Healthcare institutions
  • Emergency response organizations
  • Defense-related personnel

These sectors are high-value due to their access to sensitive operational and strategic information.


Potential Impact on Organizations

If successful, this campaign can lead to:

  • Credential compromise and account takeover
  • Exposure of sensitive communications
  • Intelligence gathering and espionage
  • Lateral movement across networks
  • Long-term persistent access

Because messaging platforms like WhatsApp are involved, attackers can gain insight into internal and external communications.


What Organisations Should Do Now

Organizations must take immediate defensive measures.

Recommended actions include:

  • Restrict execution of LNK, HTA, and script files
  • Limit use of tools like mshta.exe and PowerShell
  • Implement strong email filtering and phishing detection
  • Enforce multi-factor authentication
  • Monitor access to browser and messaging data

Reducing initial access vectors is critical.


Detection and Monitoring Strategies

Security teams should monitor for:

  • Execution of LNK files from user directories
  • mshta.exe activity
  • Unusual access to browser credential stores
  • WhatsApp database access anomalies
  • Suspicious outbound connections

Behavior-based detection is essential due to the stealthy nature of the attack.


The Role of Penetration Testing

Penetration testing can help identify exposure to this type of campaign.

Testing should include:

  • Phishing simulation exercises
  • Credential harvesting scenarios
  • Endpoint detection validation
  • Lateral movement simulations

These exercises help organizations understand real-world attack paths.


Key Takeaway

The UAC-0247 campaign highlights a growing trend in cyber threats, where attackers focus on stealthy data exfiltration rather than immediate disruption. By targeting browser credentials and messaging platforms like WhatsApp, threat actors can gain deep visibility into organizational operations.

Organizations must prioritize identity security, endpoint monitoring, and user awareness to defend against this evolving class of espionage-driven cyberattacks.

Contact Us Now to Prepare
for Digital Warfare


      • info@digitalwarfare.com

      • +1 757-900-9968

Share
Copyright © Digital Warfare. All rights reserved.
  • Home
  • About
  • Locations