UAC-0247 Espionage Campaign Targets Ukrainian Government and Healthcare with Data-Stealing Malware

CERT-UA Warns of UAC-0247 Cyber-Espionage Campaign Targeting Government and Healthcare in Ukraine

HIGH
April 18, 2026
6m read
Threat ActorPhishingCyberattack

Related Entities

Threat Actors

UAC-0247

Organizations

Products & Tech

WhatsApp

Other

RAVENSHELLUkraine

Full Report

Executive Summary

The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert (CERT-UA#9240) detailing a targeted cyber-espionage campaign conducted by the threat actor group UAC-0247. Active from March to April 2026, the campaign has focused on Ukrainian government organizations and municipal healthcare facilities, including clinics and hospitals. The attackers use phishing lures, often themed around humanitarian aid, to trick victims into executing a malicious payload. The malware's primary objective is to steal sensitive data, specifically targeting information from Chromium-based web browsers and the WhatsApp desktop application. The complex infection chain utilizes LNK and HTA files to ultimately inject a backdoor, similar to RAVENSHELL, into trusted system processes to evade detection.

Threat Overview

UAC-0247 is conducting a classic espionage operation with a focus on data exfiltration from specific, high-value targets within Ukraine. The choice of targets—government and healthcare—suggests a motive of gathering intelligence on government operations and the state of civilian services during a time of conflict.

The attack begins with a socially engineered phishing email. The email contains a link that, when clicked, downloads a ZIP archive. To enhance credibility, the attackers have been observed using AI-generated websites or exploiting XSS vulnerabilities on legitimate sites to host their malicious files. Inside the ZIP archive is a Windows Shortcut file (.LNK). This reliance on user execution of a file from an archive is a common and effective TTP.

Technical Analysis

The infection process is multi-staged, designed to bypass security controls and obfuscate the final payload.

  1. Phishing (T1566.002 - Spearphishing Link): The attack is initiated via a malicious link in a phishing email.
  2. User Execution (T1204.002 - Malicious File): The victim is tricked into extracting a ZIP archive and clicking on a malicious .LNK shortcut file.
  3. Command and Scripting Interpreter (T1059.001 - PowerShell): The LNK file executes a command, which in turn launches an HTA file. HTA files are often used to run scripts (like VBScript or JScript) that can download and execute further payloads.
  4. Scheduled Task/Job (T1053.005): The HTA script creates a scheduled task to launch the main executable payload, establishing persistence and running with system privileges.
  5. Process Injection (T1055): To evade detection by EDR and antivirus, the malware injects its malicious shellcode into a legitimate, trusted Windows process, RuntimeBroker.exe.
  6. Data from Local System (T1005): The injected payload, a reverse TCP shell similar to RAVENSHELL, then begins its primary task: stealing data. It specifically targets credential files, cookies, and history from Chromium-based browsers and data from the local WhatsApp desktop client.
  7. Exfiltration Over C2 Channel (T1041): The stolen data is exfiltrated back to an attacker-controlled command-and-control server.

The use of process injection into RuntimeBroker.exe is a notable defense evasion technique. As RuntimeBroker.exe is a legitimate Windows process that manages app permissions, its network activity might be considered normal by less sophisticated security tools, allowing the malware to blend in.

Impact Assessment

The impact of this campaign is primarily intelligence loss for the targeted Ukrainian entities. The theft of browser data can expose sensitive communications, usernames, passwords, and session cookies, allowing the attackers to access other government systems or personal accounts of employees. Stealing data from WhatsApp provides insight into real-time communications. This intelligence can be used for strategic advantage, to plan future attacks, or for disinformation purposes. For the healthcare facilities, the compromise of patient data or administrative systems could have serious consequences for their ability to provide care.

IOCs

CERT-UA's advisory contains specific IOCs. While not listed in the summary articles, a full investigation would retrieve them from the official source.

Cyber Observables for Detection

Type
file_name
Value
*.lnk in .zip
Description
The delivery mechanism involves tricking users into opening a LNK file from a ZIP archive.
Context
Email security gateway logs, EDR file creation events.
Type
process_name
Value
mshta.exe
Description
The HTA file is executed by mshta.exe. This process spawning from an email or browser is suspicious.
Context
EDR process lineage analysis.
Type
parent_process
Value
RuntimeBroker.exe
Description
Monitor for RuntimeBroker.exe making outbound network connections, which is atypical behavior.
Context
EDR, firewall logs.
Type
command_line_pattern
Value
schtasks.exe /create
Description
Monitor for the creation of scheduled tasks by suspicious scripts or processes.
Context
EDR, Windows Event ID 4698.

Detection & Response

Detection Strategies:

  • Attack Surface Reduction (ASR) Rules: Enable Microsoft Defender ASR rules, specifically the rule that blocks script files like .LNK and .HTA from launching downloaded executable content.
  • Process Lineage Analysis: Use an EDR to monitor process chains. A chain like Outlook.exe -> mshta.exe -> powershell.exe -> schtasks.exe is highly indicative of this attack.
  • D3FEND: Process Analysis (D3-PA): Specifically focus on the behavior of RuntimeBroker.exe. This process should not be making persistent outbound network connections or spawning other processes. Alert on any such behavior.

Response Actions:

  1. Isolate the compromised host from the network.
  2. Investigate the user account for other signs of compromise.
  3. Block the C2 domains/IPs identified during analysis at the network perimeter.
  4. Reset passwords for the affected user and any services they accessed.

Mitigation

Strategic Controls:

  • User Training (M1017): Train users to be suspicious of unsolicited emails, especially those with attachments or links, and to never open files from untrusted ZIP archives.
  • D3FEND: Executable Denylisting (D3-EDL): Block the execution of script interpreters for file types that are not required for business purposes. For most users, mshta.exe (for HTA files) can be blocked entirely.
  • Email Security: Implement an advanced email security gateway that can scan links and attachments, and sandbox potentially malicious files to detect threats before they reach the user's inbox.

Timeline of Events

1
April 18, 2026
This article was published

MITRE ATT&CK Mitigations

Train users to identify and report phishing emails and to be wary of executing files from ZIP archives.

Use Attack Surface Reduction (ASR) rules or application control policies to block the execution of potentially malicious script files like LNK and HTA.

Mapped D3FEND Techniques:

Use an EDR to monitor for suspicious process chains (e.g., email client spawning a script host) and anomalous behavior from system processes like RuntimeBroker.exe.

D3FEND Defensive Countermeasures

The UAC-0247 attack chain relies on executing scripts via legitimate Windows interpreters like mshta.exe (for HTA files). Executable Denylisting, often implemented via Microsoft Defender Attack Surface Reduction (ASR) rules or AppLocker, is a powerful countermeasure. Specifically, organizations should implement policies to block or audit the execution of these interpreters for most users. For example, an ASR rule can block 'untrusted and unsigned processes that run from USB' or 'process creations originating from PSExec and WMI commands'. More aggressively, AppLocker can be configured to block mshta.exe entirely for all users who do not have a specific business need for it. This breaks the infection chain at an early stage, preventing the LNK file's command from successfully launching the HTA payload, thus neutralizing the threat before the final backdoor is even downloaded.

To evade detection, UAC-0247 injects its final payload into the legitimate RuntimeBroker.exe process. This makes signature-based detection impossible. The key is Process Analysis focused on behavior and lineage. An EDR solution should be configured with high-severity alerts for the following RuntimeBroker.exe anomalies: 1) Network Connections: RuntimeBroker.exe is designed to manage UWP app permissions and should almost never initiate its own outbound network connections. Any persistent TCP connection from this process should be considered highly suspicious. 2) Process Ancestry: While the malware injects into an existing process, a full attack chain analysis would show the parent process (e.g., mshta.exe or powershell.exe) that led to the injection. Monitoring for suspicious process chains like Outlook.exe -> mshta.exe is critical. 3) File Access: RuntimeBroker.exe should not be accessing user browser profiles or WhatsApp data directories. EDRs configured to monitor file access can detect this anomalous data gathering behavior. These behavioral analytics provide the necessary context to uncover the malicious activity hiding within a legitimate process.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

EspionageUkraineUAC-0247CERT-UAPhishingHealthcareGovernment

📢 Share This Article

Help others stay informed about cybersecurity threats