Executive Summary
In March 2026, a sophisticated cyberattack targeted Ukrainian local governments and hospitals, deploying a new malware family named 'AgingFly.' The attack began with phishing emails offering humanitarian aid, leading recipients to compromised or fake websites. These sites delivered malicious files that, once executed, initiated a multi-stage infection process. The final payload, AgingFly, enabled attackers to steal authentication data from Chromium-based browsers and the WhatsApp messenger, and provided remote control capabilities over infected systems. CERT-UA attributed these attacks to the threat actor group UAC-0247. This incident underscores the evolving tactics of cyber adversaries, including the use of AI-generated content and advanced multi-stage malware delivery mechanisms. Organizations, especially those in critical sectors, must remain vigilant against such sophisticated social engineering attacks and enhance their cybersecurity defenses accordingly.
Why This Matters Now
The AgingFly malware campaign highlights the increasing sophistication of cyber threats targeting critical infrastructure. The use of AI-generated content and multi-stage infection processes signifies a significant evolution in attack methodologies, necessitating immediate attention and enhanced defensive measures from organizations worldwide.
Attack Path Analysis
The attack commenced with a phishing email containing a link to a compromised or fake website, leading to the download of a malicious LNK file. Executing the LNK initiated an HTA script that established persistence and downloaded an EXE payload, which injected shellcode into legitimate processes. The attackers then deployed a two-stage loader, with the final payload being the AgingFly malware, which established an encrypted TCP connection to the C2 server. AgingFly exfiltrated authentication data from browsers and WhatsApp, and the attackers used tools like RustScan and Ligolo-ng for lateral movement within the network. The campaign targeted local governments and hospitals in Ukraine, aiming to steal sensitive information.
Kill Chain Progression
Initial Compromise
Description
The attackers sent phishing emails with links to compromised or fake websites, leading to the download of a malicious LNK file.
MITRE ATT&CK® Techniques
Phishing
Malicious Link
Visual Basic
Scheduled Task
Web Protocols
Screen Capture
Keylogging
Obfuscated Files or Information
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components and software are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity and Access Management
Control ID: Identity Pillar
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
AgingFly infostealer directly targets Ukrainian government entities, exploiting browser credentials and enabling lateral movement through compromised networks and systems.
Health Care / Life Sciences
Hospitals face critical data exfiltration risks from AgingFly malware targeting authentication systems, violating HIPAA compliance and compromising patient data security.
Defense/Space
Defense Forces representatives targeted by sophisticated malware campaign using encrypted communications and advanced evasion techniques to steal sensitive military credentials.
Computer/Network Security
Security professionals must address AgingFly's dynamic compilation techniques and multi-stage deployment that evades traditional detection while targeting authentication infrastructure.
Sources
- New AgingFly malware used in attacks on Ukraine govt, hospitalshttps://www.bleepingcomputer.com/news/security/new-agingfly-malware-used-in-attacks-on-ukraine-govt-hospitals/Verified
- CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emailshttps://thehackernews.com/2026/04/cert-ua-impersonation-campaign-spread.htmlVerified
- Pro-Russian hackers pose as Ukraine's cyber agency to target government, businesseshttps://therecord.media/pro-russian-hackers-posing-as-ukrainian-cyber-agencyVerified
- Fake CERT-UA emails push AGEWHEEZE in mass Ukraine phishing wavehttps://www.bitdefender.com/en-us/blog/hotforsecurity/cert-ua-emails-agewheeze-phishing/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust Cloud Native Security Fabric (CNSF) is pertinent to this incident as it could likely limit the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and identity-aware policies within the cloud environment.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix CNSF primarily focuses on intra-cloud security, its comprehensive visibility and control could likely assist in identifying and mitigating the impact of such initial compromise attempts.
Control: Zero Trust Segmentation
Mitigation: Aviatrix's Zero Trust Segmentation could likely limit the attacker's ability to escalate privileges by enforcing strict access controls and isolating workloads.
Control: East-West Traffic Security
Mitigation: Aviatrix's East-West Traffic Security could likely constrain lateral movement by monitoring and controlling internal traffic flows.
Control: Multicloud Visibility & Control
Mitigation: Aviatrix's Multicloud Visibility & Control could likely detect and limit unauthorized command and control communications.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix's Egress Security & Policy Enforcement could likely limit data exfiltration by controlling outbound traffic.
While Aviatrix CNSF cannot prevent initial access, its controls could likely reduce the overall impact by limiting the attacker's ability to move laterally and exfiltrate data.
Impact at a Glance
Affected Business Functions
- Public Citizen Services
- Healthcare Services
- Financial Services
- Educational Services
Estimated downtime: 3 days
Estimated loss: $50,000
Potential exposure of sensitive government communications, patient health records, financial data, and educational records.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict lateral movement and limit the spread of malware within the network.
- • Deploy East-West Traffic Security controls to monitor and control internal traffic, detecting unauthorized access and data exfiltration attempts.
- • Utilize Egress Security & Policy Enforcement to filter outbound traffic, preventing unauthorized data exfiltration and communication with malicious C2 servers.
- • Enhance Threat Detection & Anomaly Response capabilities to identify and respond to suspicious activities, such as the execution of unauthorized scripts or unusual network traffic patterns.
- • Conduct regular security awareness training for employees to recognize phishing attempts and avoid interacting with malicious links or attachments.



