{"id":31,"date":"2026-02-25T23:44:23","date_gmt":"2026-02-25T23:44:23","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=31"},"modified":"2026-02-25T23:44:23","modified_gmt":"2026-02-25T23:44:23","slug":"uac-0050-targets-european-financial-institution-with-spoofed-domain-and-rms-malware","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=31","title":{"rendered":"UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Feb 24, 2026<\/span><\/span><span class=\"p-tags\">Cyber Espionage \/ Malware<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMR8uMyTA6j9P1KBgNFXf7uKvuD9CpolHGiMuaTIMOc87IKSqoGXWxea4Hs3unk1kLewzUd0hyOxpk6AsnEy1WmKwQwW8QV2zFBJiCi6PLOMi5zxAD_C2_DZytczAcPCSA_JGN9Se8arByQlLzoTiDaX1qJiA0Q6IT2Sfeg7BgkeQZ2ptQcjo_RX8jMgs1\/s1700-e365\/bank-cyberattack.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor&#8217;s targeting beyond Ukraine and into entities supporting the <a href=\"https:\/\/ukraine.un.org\/en\/310531-immense-devastation-amid-severe-and-worsening-disruption-basic-services-four-years-full\" rel=\"noopener\" target=\"_blank\">war-torn nation<\/a>.<\/p>\n<p>The activity, which targeted an unnamed entity involved in regional development and reconstruction initiatives, has been attributed to a cybercrime group tracked as <strong>UAC-0050<\/strong> (aka <a href=\"https:\/\/blog.bushidotoken.net\/2024\/03\/tracking-adversaries-uac-0050-cracking.html\" rel=\"noopener\" target=\"_blank\">DaVinci Group<\/a>). BlueVoyant has designated the name Mercenary Akula to the threat cluster. The attack was observed earlier this month.<\/p>\n<p>\u00abThe attack spoofed a Ukrainian judicial domain to deliver an email containing a link to a remote access payload,\u00bb researchers Patrick McHale and Joshua Green <a href=\"https:\/\/www.bluevoyant.com\/blog\/mercenary-akula-hits-financial-institution\" rel=\"noopener\" target=\"_blank\">said<\/a> in a report shared with The Hacker News. \u00abThe target was a senior legal and policy advisor involved in procurement, a role with privileged insight into institutional operations and financial mechanisms.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/sse-customer-awards-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5Ij_-TeqFMEsRFzgRRFzSRlVK6oHCncN_eJ2fkOdsA_1tN9HQbAlEEife2Z2JUt1lPv4st5n9KZP84jGEYY9Up6BQ7QE-N5rs6OhzL5thxGzVxnMx3JH9cGRLi9S5Kl-iV5PgjBeTdkBLnv_inF8UUAo88iqdmgJuPIc_6qiPyUMXwFyZWbZvkZkcRXSw\/s728-e100\/gartner-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The starting point is a spear-phishing email that uses legal themes to direct recipients to download an archive file hosted on PixelDrain, a file-sharing service used by the threat actor to bypass reputation-based security controls.<\/p>\n<p>The ZIP is responsible for initiating a multi-layered infection chain. Present within the ZIP file is a RAR archive that contains a password-protected 7-Zip file, which includes an executable that masquerades as a PDF document by using the widely abused double extension trick (*.pdf.exe).<\/p>\n<p>The execution results in the deployment of an MSI installer for Remote Manipulator System (RMS), a <a href=\"https:\/\/thehackernews.com\/2024\/12\/horns-campaign-delivers-rats-via-fake.html\" rel=\"noopener\" target=\"_blank\">Russian remote desktop software that allows remote control, desktop sharing, and file transfers.<\/p>\n<p>\u00abThe use of such &#8216;living-off-the-land&#8217; tools provides attackers with persistent, stealthy access while often evading traditional antivirus detection,\u00bb the researchers noted.<\/p>\n<p>The use of RMS aligns with prior UAC-0050 modus operandi, with the threat actor known to drop legitimate remote access software like LiteManager and remote access trojans such as RemcosRAT in attacks targeting Ukraine.<\/p>\n<p>The Computer Emergency Response Team of Ukraine (CERT-UA) has <a href=\"https:\/\/cert.gov.ua\/article\/6277822\" rel=\"noopener\" target=\"_blank\">characterized<\/a> UAC-0050 as a mercenary group associated with Russian law enforcement agencies that conducts data gathering, financial theft, and information and psychological operations under the Fire Cells branding.<\/p>\n<p>\u00abThis attack reflects Mercenary Akula&#8217;s well-established and repetitive attack profile, while also offering a notable development,\u00bb BlueVoyant said. \u00abFirst, their targeting has been primarily focused on Ukraine-based entities, especially accountants and financial officers. However, this incident suggests potential probing of Ukraine-supporting institutions in Western Europe.\u00bb<\/p>\n<p>The disclosure comes as Ukraine revealed that Russian cyber attacks aimed at the country&#8217;s energy infrastructure are increasingly focused on collecting intelligence to guide missile strikes rather than immediately disrupting operations, The Record <a href=\"https:\/\/therecord.media\/ukraine-cyberattacks-guiding-russian-missile-strikes\" rel=\"noopener\" target=\"_blank\">reported<\/a>.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ztw-hands-on-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhC66R4wPZ8qksTJukqlCCmrHCUX65DnpWW1nKnkOhy0Poe219tacbU6h09qEfUgRHxoObBazf3SVJ4OAd_iVd0EFecj-vskZSfroQ7rh0XyxQd6Ep_zNgqDW95YU4zG1Gpin8rHPK8Rqu_1KV7tf-G-7JJhxOVHhRJDWnj0qfq82uZSAvAG2rxK-Fe5fwd\/s728-e100\/ThreatLocker-d.png\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Cybersecurity company CrowdStrike, in its annual <a href=\"https:\/\/www.crowdstrike.com\/en-us\/blog\/crowdstrike-2026-global-threat-report-findings\/\" rel=\"noopener\" target=\"_blank\">Global Threat Report<\/a>, said it expects Russia-nexus adversaries to continue conducting aggressive operations with the goal of intelligence gathering from Ukrainian targets and NATO member states.<\/p>\n<p>This includes efforts undertaken by APT29 (aka Cozy Bear and Midnight Blizzard) to \u00absystematically\u00bb exploit trust, organizational credibility, and platform legitimacy as part of spear-phishing campaigns targeting U.S.-based non-governmental organizations (NGOs) and a U.S.-based legal entity to gain unauthorized access to the victims&#8217; Microsoft accounts.<\/p>\n<p>\u00abCozy Bear successfully compromised or impersonated individuals with whom targeted users maintained trusting professional relationships,\u00bb CrowdStrike said. \u00abImpersonated individuals included employees from international NGO branches and pro-Ukraine organizations.\u00bb<\/p>\n<p>\u00abThe adversary heavily invested in substantiating these impersonations, using compromised individuals&#8217; legitimate email accounts alongside burner communication channels to reinforce authenticity.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Feb 24, 2026Cyber Espionage \/ Malware A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence&hellip;<\/p>\n","protected":false},"author":1,"featured_media":32,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[83,79,80,81,42,84,82,78,77],"class_list":["post-31","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-domain","tag-european","tag-financial","tag-institution","tag-malware","tag-rms","tag-spoofed","tag-targets","tag-uac0050"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/31","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=31"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/31\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/32"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=31"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=31"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}