{"id":43917,"date":"2026-02-25T07:40:29","date_gmt":"2026-02-24T23:40:29","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/25\/uac-0050-targets-european-financial-institution-with-spoofed-domain-and-rms-malware\/"},"modified":"2026-02-25T07:40:29","modified_gmt":"2026-02-24T23:40:29","slug":"uac-0050-targets-european-financial-institution-with-spoofed-domain-and-rms-malware","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/25\/uac-0050-targets-european-financial-institution-with-spoofed-domain-and-rms-malware\/","title":{"rendered":"UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMR8uMyTA6j9P1KBgNFXf7uKvuD9CpolHGiMuaTIMOc87IKSqoGXWxea4Hs3unk1kLewzUd0hyOxpk6AsnEy1WmKwQwW8QV2zFBJiCi6PLOMi5zxAD_C2_DZytczAcPCSA_JGN9Se8arByQlLzoTiDaX1qJiA0Q6IT2Sfeg7BgkeQZ2ptQcjo_RX8jMgs1\/s1600\/bank-cyberattack.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMR8uMyTA6j9P1KBgNFXf7uKvuD9CpolHGiMuaTIMOc87IKSqoGXWxea4Hs3unk1kLewzUd0hyOxpk6AsnEy1WmKwQwW8QV2zFBJiCi6PLOMi5zxAD_C2_DZytczAcPCSA_JGN9Se8arByQlLzoTiDaX1qJiA0Q6IT2Sfeg7BgkeQZ2ptQcjo_RX8jMgs1\/s1600\/bank-cyberattack.jpg\" alt=\"UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware\"\/><\/a><\/div>\n<p>A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor&#8217;s targeting beyond Ukraine and into entities supporting the <a href=\"https:\/\/ukraine.un.org\/en\/310531-immense-devastation-amid-severe-and-worsening-disruption-basic-services-four-years-full\" rel=\"noopener\" target=\"_blank\">war-torn nation<\/a>.<\/p>\n<p>The activity, which targeted an unnamed entity involved in regional development and reconstruction initiatives, has been attributed to a cybercrime group tracked as <strong><a href=\"https:\/\/thehackernews.com\/2025\/09\/comicform-and-sectorj149-hackers-deploy.html\" rel=\"noopener\" target=\"_blank\">UAC-0050<\/a><\/strong> (aka <a href=\"https:\/\/blog.bushidotoken.net\/2024\/03\/tracking-adversaries-uac-0050-cracking.html\" rel=\"noopener\" target=\"_blank\">DaVinci Group<\/a>). BlueVoyant has designated the name Mercenary Akula to the threat cluster. The attack was observed earlier this month.<\/p>\n<p>&#8220;The attack spoofed a Ukrainian judicial domain to deliver an email containing a link to a remote access payload,&#8221; researchers Patrick McHale and Joshua Green <a href=\"https:\/\/www.bluevoyant.com\/blog\/mercenary-akula-hits-financial-institution\" rel=\"noopener\" target=\"_blank\">said<\/a> in a report shared with The Hacker News. &#8220;The target was a senior legal and policy advisor involved in procurement, a role with privileged insight into institutional operations and financial mechanisms.&#8221;<\/p>\n<p>The starting point is a spear-phishing email that uses legal themes to direct recipients to download an archive file hosted on PixelDrain, a file-sharing service used by the threat actor to bypass reputation-based security controls.<\/p>\n<p> <a name=\"more\"><\/a> <\/p>\n<p>The ZIP is responsible for initiating a multi-layered infection chain. Present within the ZIP file is a RAR archive that contains a password-protected 7-Zip file, which includes an executable that masquerades as a PDF document by using the widely abused double extension trick (*.pdf.exe).<\/p>\n<p>The execution results in the deployment of an MSI installer for Remote Manipulator System (RMS), a <a href=\"https:\/\/thehackernews.com\/2024\/12\/horns-campaign-delivers-rats-via-fake.html\" rel=\"noopener\" target=\"_blank\">Russian remote desktop software<\/a> that allows remote control, desktop sharing, and file transfers.<\/p>\n<p>&#8220;The use of such &#8216;living-off-the-land&#8217; tools provides attackers with persistent, stealthy access while often evading traditional antivirus detection,&#8221; the researchers noted.<\/p>\n<p>The use of RMS <a href=\"https:\/\/thehackernews.com\/2024\/01\/uac-0050-group-using-new-phishing.html\" rel=\"noopener\" target=\"_blank\">aligns<\/a> with <a href=\"https:\/\/thehackernews.com\/2024\/11\/russian-hackers-exploit-new-ntlm-flaw.html\" rel=\"noopener\" target=\"_blank\">prior UAC-0050 modus operandi<\/a>, with the threat actor known to drop legitimate remote access software like LiteManager and remote access trojans such as RemcosRAT in attacks targeting Ukraine.<\/p>\n<p>The Computer Emergency Response Team of Ukraine (CERT-UA) has <a href=\"https:\/\/cert.gov.ua\/article\/6277822\" rel=\"noopener\" target=\"_blank\">characterized<\/a> UAC-0050 as a mercenary group associated with Russian law enforcement agencies that <a href=\"https:\/\/thehackernews.com\/2024\/10\/russian-romcom-attacks-target-ukrainian.html\" rel=\"noopener\" target=\"_blank\">conducts<\/a> data gathering, financial theft, and information and psychological operations under the Fire Cells branding.<\/p>\n<p>&#8220;This attack reflects Mercenary Akula&#8217;s well-established and repetitive attack profile, while also offering a notable development,&#8221; BlueVoyant said. &#8220;First, their targeting has been primarily focused on Ukraine-based entities, especially accountants and financial officers. However, this incident suggests potential probing of Ukraine-supporting institutions in Western Europe.&#8221;<\/p>\n<p>The disclosure comes as Ukraine revealed that Russian cyber attacks aimed at the country&#8217;s energy infrastructure are increasingly focused on collecting intelligence to guide missile strikes rather than immediately disrupting operations, The Record <a href=\"https:\/\/therecord.media\/ukraine-cyberattacks-guiding-russian-missile-strikes\" rel=\"noopener\" target=\"_blank\">reported<\/a>.<\/p>\n<p>Cybersecurity company CrowdStrike, in its annual <a href=\"https:\/\/www.crowdstrike.com\/en-us\/blog\/crowdstrike-2026-global-threat-report-findings\/\" rel=\"noopener\" target=\"_blank\">Global Threat Report<\/a>, said it expects Russia-nexus adversaries to continue conducting aggressive operations with the goal of intelligence gathering from Ukrainian targets and NATO member states.<\/p>\n<p>This includes efforts undertaken by <a href=\"https:\/\/thehackernews.com\/2024\/03\/microsoft-confirms-russian-hackers.html\" rel=\"noopener\" target=\"_blank\">APT29<\/a> (aka Cozy Bear and Midnight Blizzard) to &#8220;systematically&#8221; exploit trust, organizational credibility, and platform legitimacy as part of spear-phishing campaigns targeting U.S.-based non-governmental organizations (NGOs) and a U.S.-based legal entity to gain unauthorized access to the victims&#8217; Microsoft accounts.<\/p>\n<p>&#8220;Cozy Bear successfully compromised or impersonated individuals with whom targeted users maintained trusting professional relationships,&#8221; CrowdStrike said. &#8220;Impersonated individuals included employees from international NGO branches and pro-Ukraine organizations.&#8221;<\/p>\n<p>&#8220;The adversary heavily invested in substantiating these impersonations, using compromised individuals&#8217; legitimate email accounts alongside burner communication channels to reinforce authenticity.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor&#8217;s targeting beyond Ukraine and into entities supporting the war-torn nation.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-43917","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43917"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43917\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}