Ukrainian Emergency Services and Hospitals Hit by Espionage Campaign Using New AgingFly Malware

Ukrainian Emergency Services and Hospitals Hit by Espionage Campaign Using New AgingFly Malware

The Record by Recorded Future
The Record by Recorded FutureApr 16, 2026

Why It Matters

The intrusion jeopardizes sensitive health data, disrupts emergency response capabilities, and demonstrates how state‑backed actors are leveraging sophisticated malware to undermine Ukraine’s civil and defense sectors. It signals an escalating cyber‑warfront that could spill over to NATO allies and the broader European digital ecosystem.

Key Takeaways

  • AgingFly malware used in phishing attacks on Ukrainian hospitals
  • Hackers stole data and mined cryptocurrency with XMRig
  • Fake humanitarian aid emails delivered malicious archive containing multiple tools
  • APT28 (Fancy Bear) linked to campaign targeting emergency services
  • Potential expansion to Ukraine Defense Forces via Signal-distributed malware

Pulse Analysis

The latest wave of cyber‑espionage against Ukraine reflects a strategic shift toward targeting essential public‑health infrastructure. While the country’s cyber‑defense units have long focused on military networks, the deployment of AgingFly and its companion tools against hospitals and emergency medical services marks a deliberate attempt to cripple civilian resilience. By embedding the payload in seemingly benign humanitarian‑aid correspondence, attackers exploit the urgency of crisis response, increasing the likelihood of user interaction and bypassing traditional security awareness measures.

Technically, AgingFly offers a full remote‑access capability, allowing operators to execute commands, capture screenshots, log keystrokes and exfiltrate browser credentials via ChromeElevator. SilentLoop adds a stealthy command‑and‑control channel that leverages Telegram, while ZapixDesk targets WhatsApp accounts, expanding the data‑theft surface. The inclusion of XMRig, a legitimate crypto‑mining tool, indicates a dual motive: intelligence gathering and financial gain. The use of AI‑generated fake organization sites further complicates detection, as malicious scripts blend with legitimate content, challenging conventional URL‑filtering solutions.

For Ukrainian stakeholders, the breach raises immediate operational concerns. Hospitals facing ransomware or data theft could see patient records compromised, undermining trust and potentially delaying critical care. The reported targeting of Defense Forces through Signal‑distributed malware suggests a broader campaign to infiltrate command structures and gather tactical intelligence. Regional allies must heed these tactics, reinforcing email security, implementing multi‑factor authentication, and conducting regular threat‑hunts to identify dormant implants. As cyber‑warfare increasingly blurs the line between espionage and sabotage, proactive defense and cross‑border information sharing become essential to safeguard both civilian and military domains.

Ukrainian emergency services and hospitals hit by espionage campaign using new AgingFly malware

Comments

Want to join the conversation?

Loading comments...