UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我需要理解文章的主要内容。 这篇文章讲的是一个与俄罗斯有关的网络威胁行为者,他们针对欧洲的一个金融机构进行了网络间谍活动。攻击手段是钓鱼邮件,伪装成乌克兰司法域名,然后通过一系列的文件下载最终安装远程控制软件。目标是获取情报或进行金融盗窃,可能扩展到支持乌克兰的机构。 接下来,我需要把这些关键点浓缩到100字以内。重点包括:俄罗斯相关威胁、欧洲金融机构、钓鱼邮件、伪装域名、下载恶意软件、目标角色、情报或金融盗窃目的、可能扩展到西方机构。 然后,我要确保语言简洁明了,不使用复杂的术语,同时涵盖所有主要信息点。最后检查字数是否在限制内,并且没有使用任何开头模板。 </think> 一个与俄罗斯相关的网络威胁行为者针对欧洲一家金融机构发起钓鱼攻击,伪装成乌克兰司法域名,诱导目标下载恶意软件以获取情报或实施金融盗窃。攻击目标为参与地区重建工作的高级顾问。此次行动显示该威胁行为者可能将目标扩展至支持乌克兰的西方机构。 2026-2-24 14:21:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Cyber Espionage / Malware

A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering attack to likely facilitate intelligence gathering or financial theft, signaling a possible expansion of the threat actor's targeting beyond Ukraine and into entities supporting the war-torn nation.

The activity, which targeted an unnamed entity involved in regional development and reconstruction initiatives, has been attributed to a cybercrime group tracked as UAC-0050 (aka DaVinci Group). BlueVoyant has designated the name Mercenary Akula to the threat cluster. The attack was observed earlier this month.

"The attack spoofed a Ukrainian judicial domain to deliver an email containing a link to a remote access payload," researchers Patrick McHale and Joshua Green said in a report shared with The Hacker News. "The target was a senior legal and policy advisor involved in procurement, a role with privileged insight into institutional operations and financial mechanisms."

The starting point is a spear-phishing email that uses legal themes to direct recipients to download an archive file hosted on PixelDrain, a file-sharing service used by the threat actor to bypass reputation-based security controls.

The ZIP is responsible for initiating a multi-layered infection chain. Present within the ZIP file is a RAR archive that contains a password-protected 7-Zip file, which includes an executable that masquerades as a PDF document by using the widely abused double extension trick (*.pdf.exe).

The execution results in the deployment of an MSI installer for Remote Manipulator System (RMS), a Russian remote desktop software that allows remote control, desktop sharing, and file transfers.

"The use of such 'living-off-the-land' tools provides attackers with persistent, stealthy access while often evading traditional antivirus detection," the researchers noted.

The use of RMS aligns with prior UAC-0050 modus operandi, with the threat actor known to drop legitimate remote access software like LiteManager and remote access trojans such as RemcosRAT in attacks targeting Ukraine.

The Computer Emergency Response Team of Ukraine (CERT-UA) has characterized UAC-0050 as a mercenary group associated with Russian law enforcement agencies that conducts data gathering, financial theft, and information and psychological operations under the Fire Cells branding.

"This attack reflects Mercenary Akula's well-established and repetitive attack profile, while also offering a notable development," BlueVoyant said. "First, their targeting has been primarily focused on Ukraine-based entities, especially accountants and financial officers. However, this incident suggests potential probing of Ukraine-supporting institutions in Western Europe."

The disclosure comes as Ukraine revealed that Russian cyber attacks aimed at the country's energy infrastructure are increasingly focused on collecting intelligence to guide missile strikes rather than immediately disrupting operations, The Record reported.

Cybersecurity company CrowdStrike, in its annual Global Threat Report, said it expects Russia-nexus adversaries to continue conducting aggressive operations with the goal of intelligence gathering from Ukrainian targets and NATO member states.

This includes efforts undertaken by APT29 (aka Cozy Bear and Midnight Blizzard) to "systematically" exploit trust, organizational credibility, and platform legitimacy as part of spear-phishing campaigns targeting U.S.-based non-governmental organizations (NGOs) and a U.S.-based legal entity to gain unauthorized access to the victims' Microsoft accounts.

"Cozy Bear successfully compromised or impersonated individuals with whom targeted users maintained trusting professional relationships," CrowdStrike said. "Impersonated individuals included employees from international NGO branches and pro-Ukraine organizations."

"The adversary heavily invested in substantiating these impersonations, using compromised individuals' legitimate email accounts alongside burner communication channels to reinforce authenticity."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/uac-0050-targets-european-financial.html
如有侵权请联系:admin#unsafe.sh