Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
UAC-0050 Expands to European Finance with RMS Malware

UAC-0050 Expands to European Finance with RMS Malware

Posted on February 24, 2026 By CWS

A recent cyber attack involving the Russia-associated group UAC-0050 has targeted a financial institution in Europe. This incident suggests an expansion in the group’s focus from Ukrainian targets to entities that support the nation, indicating a strategic shift in their operations.

Details of the Cyber Attack

The attack, which took place earlier this month, involved the cybercrime group known as UAC-0050, also referred to as the DaVinci Group or Mercenary Akula. The targeted entity, involved in regional development and reconstruction, received a spear-phishing email that appeared to originate from a Ukrainian judicial domain. This email directed the recipient to download a malicious archive file.

The phishing email targeted a senior advisor engaged in procurement, a role that involves significant access to sensitive institutional data and financial systems. The malicious archive led to a multi-layered infection chain, starting with a ZIP file containing a RAR archive. Within this was a password-protected 7-Zip file, disguising an executable as a PDF file.

RMS Malware Deployment

Executing this file installed the Remote Manipulator System (RMS), a Russian-developed remote desktop software. RMS facilitates remote control, desktop sharing, and file transfer capabilities, enabling attackers to maintain a stealthy presence and evade traditional antivirus detection.

The use of RMS aligns with UAC-0050’s known methods, which often involve deploying legitimate remote access tools. Previously, they have used software like LiteManager and RemcosRAT in their attacks on Ukrainian targets.

Implications and Future Threats

This attack marks a notable development in UAC-0050’s strategy, as noted by BlueVoyant researchers. Historically focused on Ukraine, particularly financial professionals, this incident highlights potential interest in Western European institutions allied with Ukraine.

In a broader context, Ukraine has reported an increase in Russian cyber attacks on its energy infrastructure. These attacks are predominantly intelligence-gathering operations to guide missile strikes rather than to immediately disrupt services.

CrowdStrike’s Global Threat Report anticipates continued aggressive operations by Russian-linked adversaries, targeting both Ukrainian and NATO member states. Groups like APT29, known as Cozy Bear, have been systematically exploiting organizational trust and credibility in spear-phishing campaigns against U.S.-based NGOs and legal entities.

As cyber threats evolve, institutions must remain vigilant and enhance their security measures to protect against sophisticated attacks like those orchestrated by UAC-0050.

The Hacker News Tags:cyber espionage, Cybersecurity, Europe, financial institutions, Mercenary Akula, remote access, RMS malware, spear-phishing, spoofed domain, UAC-0050

Post navigation

Previous Post: Critical Ruby Flaw Could Lead to System Takeover
Next Post: Ransomware Hits 65% of Financial Firms in 2024

Related Posts

New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts The Hacker News
Securing Data in the AI Era Securing Data in the AI Era The Hacker News
One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief The Hacker News
TeamPCP Exploits Cloud Vulnerabilities for Cybercrime TeamPCP Exploits Cloud Vulnerabilities for Cybercrime The Hacker News
Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine The Hacker News
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Enhances Chrome Security with Device-Bound Sessions
  • Law Enforcement’s Use of Webloc for Global Device Tracking
  • AI-Powered Cyberattack Compromises Mexican Government Agencies
  • Rise of Advanced EDR Killers in Ransomware Attacks
  • Claude AI Enhances Microsoft Word with New Beta Integration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Enhances Chrome Security with Device-Bound Sessions
  • Law Enforcement’s Use of Webloc for Global Device Tracking
  • AI-Powered Cyberattack Compromises Mexican Government Agencies
  • Rise of Advanced EDR Killers in Ransomware Attacks
  • Claude AI Enhances Microsoft Word with New Beta Integration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark