By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
Computing

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

News Room
Last updated: 2026/02/24 at 12:16 PM
News Room Published 24 February 2026
Share
UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
SHARE

Ravie LakshmananFeb 24, 2026Cyber Espionage / Malware

A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor’s targeting beyond Ukraine and into entities supporting the war-torn nation.

The activity, which targeted an unnamed entity involved in regional development and reconstruction initiatives, has been attributed to a cybercrime group tracked as UAC-0050 (aka DaVinci Group). BlueVoyant has designated the name Mercenary Akula to the threat cluster. The attack was observed earlier this month.

“The attack spoofed a Ukrainian judicial domain to deliver an email containing a link to a remote access payload,” researchers Patrick McHale and Joshua Green said in a report shared with The Hacker News. “The target was a senior legal and policy advisor involved in procurement, a role with privileged insight into institutional operations and financial mechanisms.”

The starting point is a spear-phishing email that uses legal themes to direct recipients to download an archive file hosted on PixelDrain, a file-sharing service used by the threat actor to bypass reputation-based security controls.

The ZIP is responsible for initiating a multi-layered infection chain. Present within the ZIP file is a RAR archive that contains a password-protected 7-Zip file, which includes an executable that masquerades as a PDF document by using the widely abused double extension trick (*.pdf.exe).

The execution results in the deployment of an MSI installer for Remote Manipulator System (RMS), a Russian remote desktop software that allows remote control, desktop sharing, and file transfers.

“The use of such ‘living-off-the-land’ tools provides attackers with persistent, stealthy access while often evading traditional antivirus detection,” the researchers noted.

The use of RMS aligns with prior UAC-0050 modus operandi, with the threat actor known to drop legitimate remote access software like LiteManager and remote access trojans such as RemcosRAT in attacks targeting Ukraine.

The Computer Emergency Response Team of Ukraine (CERT-UA) has characterized UAC-0050 as a mercenary group associated with Russian law enforcement agencies that conducts data gathering, financial theft, and information and psychological operations under the Fire Cells branding.

“This attack reflects Mercenary Akula’s well-established and repetitive attack profile, while also offering a notable development,” BlueVoyant said. “First, their targeting has been primarily focused on Ukraine-based entities, especially accountants and financial officers. However, this incident suggests potential probing of Ukraine-supporting institutions in Western Europe.”

The disclosure comes as Ukraine revealed that Russian cyber attacks aimed at the country’s energy infrastructure are increasingly focused on collecting intelligence to guide missile strikes rather than immediately disrupting operations, The Record reported.

Cybersecurity company CrowdStrike, in its annual Global Threat Report, said it expects Russia-nexus adversaries to continue conducting aggressive operations with the goal of intelligence gathering from Ukrainian targets and NATO member states.

This includes efforts undertaken by APT29 (aka Cozy Bear and Midnight Blizzard) to “systematically” exploit trust, organizational credibility, and platform legitimacy as part of spear-phishing campaigns targeting U.S.-based non-governmental organizations (NGOs) and a U.S.-based legal entity to gain unauthorized access to the victims’ Microsoft accounts.

“Cozy Bear successfully compromised or impersonated individuals with whom targeted users maintained trusting professional relationships,” CrowdStrike said. “Impersonated individuals included employees from international NGO branches and pro-Ukraine organizations.”

“The adversary heavily invested in substantiating these impersonations, using compromised individuals’ legitimate email accounts alongside burner communication channels to reinforce authenticity.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article AMD may have just made these high-end handhelds obsolete after only two and a half years AMD may have just made these high-end handhelds obsolete after only two and a half years
Next Article Crypto News: Pepeto Presale Crosses .285M as Bernstein Targets 0,000 Bitcoin and Altcoin Rotation Begins Crypto News: Pepeto Presale Crosses $7.285M as Bernstein Targets $250,000 Bitcoin and Altcoin Rotation Begins
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

You’ve Probably Read AI Writing Today. Here Are 7 Surefire Ways to Spot It
You’ve Probably Read AI Writing Today. Here Are 7 Surefire Ways to Spot It
News
Enormous AI growth zone datacentre gets planning approval | Computer Weekly
Enormous AI growth zone datacentre gets planning approval | Computer Weekly
News
The Samsung Galaxy S26 Ultra Makes Me Wish All Phones Had a Privacy Screen
The Samsung Galaxy S26 Ultra Makes Me Wish All Phones Had a Privacy Screen
Gadget
Can You Charge A Laptop With Your Phone’s USB-C Charger? – BGR
Can You Charge A Laptop With Your Phone’s USB-C Charger? – BGR
News

You Might also Like

Firecrawl First, Bing Second: A Safer Way to Enrich Company Data | HackerNoon
Computing

Firecrawl First, Bing Second: A Safer Way to Enrich Company Data | HackerNoon

14 Min Read
Hope Is Not a Strategy in Fintech | HackerNoon
Computing

Hope Is Not a Strategy in Fintech | HackerNoon

0 Min Read
Hangs & Performance Regression On Large Systems Fixed For Linux 7.0-rc4
Computing

Hangs & Performance Regression On Large Systems Fixed For Linux 7.0-rc4

3 Min Read
Rebuilding CRM Truth From Noisy Events | HackerNoon
Computing

Rebuilding CRM Truth From Noisy Events | HackerNoon

14 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?