Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

UAC-0050 Targets European financial institutions with spoofed domains and RMS malware

New tool provides first space weather forecast months in advance

It’s time to move away from plug-in hybrids

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » UAC-0050 Targets European financial institutions with spoofed domains and RMS malware
Identity

UAC-0050 Targets European financial institutions with spoofed domains and RMS malware

userBy userFebruary 24, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 24, 2026Cyber ​​espionage/malware

Russian-aligned threat actors have been observed targeting financial institutions in Europe as part of social engineering attacks likely to facilitate intelligence gathering and financial theft, suggesting threat actors’ targeting may expand beyond Ukraine to organizations supporting the war-torn nation.

This activity targeted anonymous organizations involved in regional development and reconstruction efforts and is believed to be the work of a cybercriminal group tracked as UAC-0050 (also known as DaVinci Group). BlueVoyant has named the threat cluster Mercenary Akula. This attack was observed earlier this month.

“The attack spoofed a Ukrainian judicial domain and delivered an email containing a link to a remote access payload,” researchers Patrick McHale and Joshua Green said in a report shared with Hacker News. “The target was a senior legal and policy advisor involved in procurement, a role with privileged insight into agency operations and financial mechanisms.”

The starting point is a spear phishing email that uses a legitimate theme and instructs the recipient to download an archive file hosted on PixelDrain. PixelDrain is a file sharing service used by threat actors to bypass reputation-based security controls.

ZIP is responsible for starting a multi-layer infection chain. Inside the ZIP file is a RAR archive containing a password-protected 7-Zip file. This file contains an executable that uses the widely exploited double extension trick (*.pdf.exe) to disguise itself as a PDF document.

When run, it deploys an MSI installer for Remote Manipulator System (RMS), a Russian remote desktop software that allows remote control, desktop sharing, and file transfer.

“The use of such ‘extraterrestrial’ tools allows attackers to gain persistent and stealth access, while often evading traditional antivirus detection,” the researchers note.

The use of RMS is consistent with previous UAC-0050 modus operandi, where the attacker is known to drop legitimate remote access software such as LiteManager and remote access Trojans such as RemcosRAT in attacks targeting Ukraine.

The Computer Emergency Response Team of Ukraine (CERT-UA) characterizes UAC-0050 as a mercenary group associated with Russian law enforcement agencies that conducts data collection, financial theft, intelligence and psychological operations under the Fire Cells brand.

“This attack reflects Mercenary Akula’s established and repetitive attack profile, while also making notable developments,” BlueVoyant said. “Firstly, their targets were primarily focused on organizations based in Ukraine, particularly accountants and financial personnel. However, this case does hint at possible investigations into Western European support agencies for Ukraine.”

The disclosures come as Ukraine reveals that Russian cyberattacks targeting the country’s energy infrastructure are increasingly focused on gathering intelligence to guide missile strikes, rather than immediately disrupting operations, The Record reported.

Cybersecurity firm CrowdStrike said in its annual Global Threat Report that it expects Russian-aligned adversaries to continue aggressive operations aimed at gathering intelligence from targets in Ukraine and NATO allies.

This includes efforts by APT29 (also known as Cozy Bear and Midnight Blizzard) to “systematically” abuse trust, organizational credibility, and platform legitimacy to gain unauthorized access to victims’ Microsoft accounts as part of a spear-phishing campaign targeting U.S.-based nongovernmental organizations (NGOs) and U.S.-based corporations.

“Cozy Bear was able to successfully compromise and impersonate individuals with whom the targeted users maintained a trusted professional relationship,” CrowdStrike said. “Individuals impersonating included employees of international NGO branches and pro-Ukrainian organizations.”

“The attackers have invested heavily in demonstrating these impersonations using the legitimate email accounts of compromised individuals, alongside burner communication channels to enhance credibility.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNew tool provides first space weather forecast months in advance
user
  • Website

Related Posts

Prioritizing identities is not a backlog issue

February 24, 2026

Lazarus Group uses Medusa ransomware in Middle East and US healthcare attacks

February 24, 2026

UnsolicitedBooker targets Central Asian telecom companies with LuciDoor and MarsSnake backdoors

February 24, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

UAC-0050 Targets European financial institutions with spoofed domains and RMS malware

New tool provides first space weather forecast months in advance

It’s time to move away from plug-in hybrids

Prioritizing identities is not a backlog issue

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.