The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert (CERT-UA#9240) detailing a targeted cyber-espionage campaign conducted by the threat actor group UAC-0247. Active from March to April 2026, the campaign has focused on Ukrainian government organizations and municipal healthcare facilities, including clinics and hospitals. The attackers use phishing lures, often themed around humanitarian aid, to trick victims into executing a malicious payload. The malware's primary objective is to steal sensitive data, specifically targeting information from Chromium-based web browsers and the WhatsApp desktop application. The complex infection chain utilizes LNK and HTA files to ultimately inject a backdoor, similar to RAVENSHELL, into trusted system processes to evade detection.
UAC-0247 is conducting a classic espionage operation with a focus on data exfiltration from specific, high-value targets within Ukraine. The choice of targets—government and healthcare—suggests a motive of gathering intelligence on government operations and the state of civilian services during a time of conflict.
The attack begins with a socially engineered phishing email. The email contains a link that, when clicked, downloads a ZIP archive. To enhance credibility, the attackers have been observed using AI-generated websites or exploiting XSS vulnerabilities on legitimate sites to host their malicious files. Inside the ZIP archive is a Windows Shortcut file (.LNK). This reliance on user execution of a file from an archive is a common and effective TTP.
The infection process is multi-staged, designed to bypass security controls and obfuscate the final payload.
T1566.002 - Spearphishing Link): The attack is initiated via a malicious link in a phishing email.T1204.002 - Malicious File): The victim is tricked into extracting a ZIP archive and clicking on a malicious .LNK shortcut file.T1059.001 - PowerShell): The LNK file executes a command, which in turn launches an HTA file. HTA files are often used to run scripts (like VBScript or JScript) that can download and execute further payloads.T1053.005): The HTA script creates a scheduled task to launch the main executable payload, establishing persistence and running with system privileges.T1055): To evade detection by EDR and antivirus, the malware injects its malicious shellcode into a legitimate, trusted Windows process, RuntimeBroker.exe.T1005): The injected payload, a reverse TCP shell similar to RAVENSHELL, then begins its primary task: stealing data. It specifically targets credential files, cookies, and history from Chromium-based browsers and data from the local WhatsApp desktop client.T1041): The stolen data is exfiltrated back to an attacker-controlled command-and-control server.The use of process injection into
RuntimeBroker.exeis a notable defense evasion technique. AsRuntimeBroker.exeis a legitimate Windows process that manages app permissions, its network activity might be considered normal by less sophisticated security tools, allowing the malware to blend in.
The impact of this campaign is primarily intelligence loss for the targeted Ukrainian entities. The theft of browser data can expose sensitive communications, usernames, passwords, and session cookies, allowing the attackers to access other government systems or personal accounts of employees. Stealing data from WhatsApp provides insight into real-time communications. This intelligence can be used for strategic advantage, to plan future attacks, or for disinformation purposes. For the healthcare facilities, the compromise of patient data or administrative systems could have serious consequences for their ability to provide care.
CERT-UA's advisory contains specific IOCs. While not listed in the summary articles, a full investigation would retrieve them from the official source.
*.lnk in .zipmshta.exemshta.exe. This process spawning from an email or browser is suspicious.RuntimeBroker.exeRuntimeBroker.exe making outbound network connections, which is atypical behavior.schtasks.exe /createDetection Strategies:
.LNK and .HTA from launching downloaded executable content.Outlook.exe -> mshta.exe -> powershell.exe -> schtasks.exe is highly indicative of this attack.RuntimeBroker.exe. This process should not be making persistent outbound network connections or spawning other processes. Alert on any such behavior.Response Actions:
Strategic Controls:
M1017): Train users to be suspicious of unsolicited emails, especially those with attachments or links, and to never open files from untrusted ZIP archives.mshta.exe (for HTA files) can be blocked entirely.Train users to identify and report phishing emails and to be wary of executing files from ZIP archives.
Use Attack Surface Reduction (ASR) rules or application control policies to block the execution of potentially malicious script files like LNK and HTA.
Mapped D3FEND Techniques:
Use an EDR to monitor for suspicious process chains (e.g., email client spawning a script host) and anomalous behavior from system processes like RuntimeBroker.exe.
The UAC-0247 attack chain relies on executing scripts via legitimate Windows interpreters like mshta.exe (for HTA files). Executable Denylisting, often implemented via Microsoft Defender Attack Surface Reduction (ASR) rules or AppLocker, is a powerful countermeasure. Specifically, organizations should implement policies to block or audit the execution of these interpreters for most users. For example, an ASR rule can block 'untrusted and unsigned processes that run from USB' or 'process creations originating from PSExec and WMI commands'. More aggressively, AppLocker can be configured to block mshta.exe entirely for all users who do not have a specific business need for it. This breaks the infection chain at an early stage, preventing the LNK file's command from successfully launching the HTA payload, thus neutralizing the threat before the final backdoor is even downloaded.
To evade detection, UAC-0247 injects its final payload into the legitimate RuntimeBroker.exe process. This makes signature-based detection impossible. The key is Process Analysis focused on behavior and lineage. An EDR solution should be configured with high-severity alerts for the following RuntimeBroker.exe anomalies: 1) Network Connections: RuntimeBroker.exe is designed to manage UWP app permissions and should almost never initiate its own outbound network connections. Any persistent TCP connection from this process should be considered highly suspicious. 2) Process Ancestry: While the malware injects into an existing process, a full attack chain analysis would show the parent process (e.g., mshta.exe or powershell.exe) that led to the injection. Monitoring for suspicious process chains like Outlook.exe -> mshta.exe is critical. 3) File Access: RuntimeBroker.exe should not be accessing user browser profiles or WhatsApp data directories. EDRs configured to monitor file access can detect this anomalous data gathering behavior. These behavioral analytics provide the necessary context to uncover the malicious activity hiding within a legitimate process.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats