Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
UAC-0050 Expands to European Finance with RMS Malware

UAC-0050 Expands to European Finance with RMS Malware

Posted on February 24, 2026 By CWS

A recent cyber attack involving the Russia-associated group UAC-0050 has targeted a financial institution in Europe. This incident suggests an expansion in the group’s focus from Ukrainian targets to entities that support the nation, indicating a strategic shift in their operations.

Details of the Cyber Attack

The attack, which took place earlier this month, involved the cybercrime group known as UAC-0050, also referred to as the DaVinci Group or Mercenary Akula. The targeted entity, involved in regional development and reconstruction, received a spear-phishing email that appeared to originate from a Ukrainian judicial domain. This email directed the recipient to download a malicious archive file.

The phishing email targeted a senior advisor engaged in procurement, a role that involves significant access to sensitive institutional data and financial systems. The malicious archive led to a multi-layered infection chain, starting with a ZIP file containing a RAR archive. Within this was a password-protected 7-Zip file, disguising an executable as a PDF file.

RMS Malware Deployment

Executing this file installed the Remote Manipulator System (RMS), a Russian-developed remote desktop software. RMS facilitates remote control, desktop sharing, and file transfer capabilities, enabling attackers to maintain a stealthy presence and evade traditional antivirus detection.

The use of RMS aligns with UAC-0050’s known methods, which often involve deploying legitimate remote access tools. Previously, they have used software like LiteManager and RemcosRAT in their attacks on Ukrainian targets.

Implications and Future Threats

This attack marks a notable development in UAC-0050’s strategy, as noted by BlueVoyant researchers. Historically focused on Ukraine, particularly financial professionals, this incident highlights potential interest in Western European institutions allied with Ukraine.

In a broader context, Ukraine has reported an increase in Russian cyber attacks on its energy infrastructure. These attacks are predominantly intelligence-gathering operations to guide missile strikes rather than to immediately disrupt services.

CrowdStrike’s Global Threat Report anticipates continued aggressive operations by Russian-linked adversaries, targeting both Ukrainian and NATO member states. Groups like APT29, known as Cozy Bear, have been systematically exploiting organizational trust and credibility in spear-phishing campaigns against U.S.-based NGOs and legal entities.

As cyber threats evolve, institutions must remain vigilant and enhance their security measures to protect against sophisticated attacks like those orchestrated by UAC-0050.

The Hacker News Tags:cyber espionage, Cybersecurity, Europe, financial institutions, Mercenary Akula, remote access, RMS malware, spear-phishing, spoofed domain, UAC-0050

Post navigation

Previous Post: Critical Ruby Flaw Could Lead to System Takeover
Next Post: Ransomware Hits 65% of Financial Firms in 2024

Related Posts

Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over  Billion Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion The Hacker News
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV The Hacker News
Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits The Hacker News
Why 2026 Will be the Year of Machine-Speed Security Why 2026 Will be the Year of Machine-Speed Security The Hacker News
The Hidden Weaknesses in AI SOC Tools that No One Talks About The Hidden Weaknesses in AI SOC Tools that No One Talks About The Hacker News
Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ransomware Hits 65% of Financial Firms in 2024
  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered
  • Reddit Faces £14.47 Million Fine for Child Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ransomware Hits 65% of Financial Firms in 2024
  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered
  • Reddit Faces £14.47 Million Fine for Child Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News