Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
UAC-0050 Expands to European Finance with RMS Malware

UAC-0050 Expands to European Finance with RMS Malware

Posted on February 24, 2026 By CWS

A recent cyber attack involving the Russia-associated group UAC-0050 has targeted a financial institution in Europe. This incident suggests an expansion in the group’s focus from Ukrainian targets to entities that support the nation, indicating a strategic shift in their operations.

Details of the Cyber Attack

The attack, which took place earlier this month, involved the cybercrime group known as UAC-0050, also referred to as the DaVinci Group or Mercenary Akula. The targeted entity, involved in regional development and reconstruction, received a spear-phishing email that appeared to originate from a Ukrainian judicial domain. This email directed the recipient to download a malicious archive file.

The phishing email targeted a senior advisor engaged in procurement, a role that involves significant access to sensitive institutional data and financial systems. The malicious archive led to a multi-layered infection chain, starting with a ZIP file containing a RAR archive. Within this was a password-protected 7-Zip file, disguising an executable as a PDF file.

RMS Malware Deployment

Executing this file installed the Remote Manipulator System (RMS), a Russian-developed remote desktop software. RMS facilitates remote control, desktop sharing, and file transfer capabilities, enabling attackers to maintain a stealthy presence and evade traditional antivirus detection.

The use of RMS aligns with UAC-0050’s known methods, which often involve deploying legitimate remote access tools. Previously, they have used software like LiteManager and RemcosRAT in their attacks on Ukrainian targets.

Implications and Future Threats

This attack marks a notable development in UAC-0050’s strategy, as noted by BlueVoyant researchers. Historically focused on Ukraine, particularly financial professionals, this incident highlights potential interest in Western European institutions allied with Ukraine.

In a broader context, Ukraine has reported an increase in Russian cyber attacks on its energy infrastructure. These attacks are predominantly intelligence-gathering operations to guide missile strikes rather than to immediately disrupt services.

CrowdStrike’s Global Threat Report anticipates continued aggressive operations by Russian-linked adversaries, targeting both Ukrainian and NATO member states. Groups like APT29, known as Cozy Bear, have been systematically exploiting organizational trust and credibility in spear-phishing campaigns against U.S.-based NGOs and legal entities.

As cyber threats evolve, institutions must remain vigilant and enhance their security measures to protect against sophisticated attacks like those orchestrated by UAC-0050.

The Hacker News Tags:cyber espionage, Cybersecurity, Europe, financial institutions, Mercenary Akula, remote access, RMS malware, spear-phishing, spoofed domain, UAC-0050

Post navigation

Previous Post: Critical Ruby Flaw Could Lead to System Takeover
Next Post: Ransomware Hits 65% of Financial Firms in 2024

Related Posts

NGINX Vulnerability Exploited in Web Traffic Hijacking NGINX Vulnerability Exploited in Web Traffic Hijacking The Hacker News
Understanding Help Desk Scams and How to Defend Your Organization Understanding Help Desk Scams and How to Defend Your Organization The Hacker News
Wazuh for Regulatory Compliance Wazuh for Regulatory Compliance The Hacker News
Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month The Hacker News
Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page The Hacker News
SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI-Powered Cyber Attacks Accelerate Threat Landscape
  • Ransomware Hits 65% of Financial Firms in 2024
  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI-Powered Cyber Attacks Accelerate Threat Landscape
  • Ransomware Hits 65% of Financial Firms in 2024
  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News