UAC-0050 Targets European Financial Institution with Spoofed Domain and RMS Malware
Summary
Hide ▲
Show ▼
UAC-0050 continues to target European financial institutions with spear-phishing and RMS malware to establish persistent access. Concurrently, Russia-aligned operations such as Ghostwriter (UAC-0057/UNC1151) have intensified phishing campaigns against Ukrainian government entities since spring 2026, using Prometheus-themed lures and sophisticated multi-stage payloads like OYSTERFRESH, OYSTERBLUES, and Cobalt Strike. Ukraine’s National Security and Defense Council also reported increased Russian use of AI tools (e.g., ChatGPT, Google Gemini) for target reconnaissance and malware runtime command generation, alongside broader Kremlin-backed campaigns focused on intelligence gathering, long-term network persistence, and influence operations. These activities align with prior reporting on Russia-nexus adversaries targeting Ukrainian entities and NATO member states, including the deployment of legitimate remote access tools like RMS by UAC-0050.
Timeline
-
24.02.2026 16:21 2 articles · 2mo ago
UAC-0050 Targets European Financial Institution with Spoofed Domain and RMS Malware
A Russia-aligned threat actor, UAC-0050, targeted a European financial institution involved in regional development and reconstruction initiatives. The attack involved a spear-phishing email spoofing a Ukrainian judicial domain to deliver a remote access payload. The campaign used a multi-layered infection chain to deploy Remote Manipulator System (RMS) malware, marking a potential expansion of the group's targeting beyond Ukraine. The attack highlights the group's use of legitimate remote access tools to maintain stealthy, persistent access while evading traditional antivirus detection. This incident suggests UAC-0050 may be probing institutions in Western Europe that support Ukraine. Additionally, Ghostwriter (UAC-0057/UNC1151), a Belarus-aligned threat actor, has been observed since spring 2026 targeting Ukrainian government entities using Prometheus-themed phishing lures. The campaign delivered OYSTERFRESH JavaScript via PDF attachments, which deployed OYSTERBLUES to the Windows Registry and Cobalt Strike via OYSTERSHUCK, enabling post-exploitation activities.
Show sources
- UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware — thehackernews.com — 24.02.2026 16:21
- Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware — thehackernews.com — 22.05.2026 19:20
Information Snippets
-
UAC-0050 targeted a European financial institution involved in regional development and reconstruction initiatives.
First reported: 24.02.2026 16:211 source, 1 articleShow sources
- UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware — thehackernews.com — 24.02.2026 16:21
-
The attack used a spear-phishing email spoofing a Ukrainian judicial domain to deliver a remote access payload.
First reported: 24.02.2026 16:211 source, 1 articleShow sources
- UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware — thehackernews.com — 24.02.2026 16:21
-
The infection chain involved a ZIP file containing a RAR archive with a password-protected 7-Zip file, which included an executable masquerading as a PDF document.
First reported: 24.02.2026 16:211 source, 1 articleShow sources
- UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware — thehackernews.com — 24.02.2026 16:21
-
The executable deployed an MSI installer for Remote Manipulator System (RMS), a Russian remote desktop software.
First reported: 24.02.2026 16:211 source, 1 articleShow sources
- UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware — thehackernews.com — 24.02.2026 16:21
-
UAC-0050 is known for using legitimate remote access software like LiteManager and remote access trojans such as RemcosRAT.
First reported: 24.02.2026 16:211 source, 1 articleShow sources
- UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware — thehackernews.com — 24.02.2026 16:21
-
CERT-UA characterizes UAC-0050 as a mercenary group associated with Russian law enforcement agencies.
First reported: 24.02.2026 16:211 source, 1 articleShow sources
- UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware — thehackernews.com — 24.02.2026 16:21
-
This attack marks a potential expansion of UAC-0050's targeting beyond Ukraine to institutions in Western Europe.
First reported: 24.02.2026 16:211 source, 1 articleShow sources
- UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware — thehackernews.com — 24.02.2026 16:21
-
Ukraine reported increased Russian cyber attacks focused on intelligence gathering to guide missile strikes.
First reported: 24.02.2026 16:211 source, 1 articleShow sources
- UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware — thehackernews.com — 24.02.2026 16:21
-
CrowdStrike's Global Threat Report indicates continued aggressive operations by Russia-nexus adversaries targeting Ukrainian entities and NATO member states.
First reported: 24.02.2026 16:211 source, 1 articleShow sources
- UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware — thehackernews.com — 24.02.2026 16:21
-
APT29 (Cozy Bear, Midnight Blizzard) has been targeting U.S.-based NGOs and legal entities to gain unauthorized access to Microsoft accounts.
First reported: 24.02.2026 16:211 source, 1 articleShow sources
- UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware — thehackernews.com — 24.02.2026 16:21
-
Ghostwriter (aka UAC-0057 and UNC1151) targeted Ukrainian government organizations using Prometheus-themed phishing lures.
First reported: 22.05.2026 19:201 source, 1 articleShow sources
- Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware — thehackernews.com — 22.05.2026 19:20
-
Ghostwriter activity has been active since spring 2026, employing compromised accounts to send phishing emails to government entities.
First reported: 22.05.2026 19:201 source, 1 articleShow sources
- Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware — thehackernews.com — 22.05.2026 19:20
-
The phishing emails contained a PDF attachment with a link triggering a ZIP archive download containing a malicious JavaScript file named OYSTERFRESH.
First reported: 22.05.2026 19:201 source, 1 articleShow sources
- Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware — thehackernews.com — 22.05.2026 19:20
-
OYSTERFRESH deployed a decoy document while writing an encrypted payload called OYSTERBLUES to the Windows Registry and downloading OYSTERSHUCK to decode it.
First reported: 22.05.2026 19:201 source, 1 articleShow sources
- Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware — thehackernews.com — 22.05.2026 19:20
-
OYSTERBLUES harvested system information (computer name, user account, OS version, boot time, running processes) and exfiltrated it via HTTP POST to a C2 server before awaiting further JavaScript commands.
First reported: 22.05.2026 19:201 source, 1 articleShow sources
- Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware — thehackernews.com — 22.05.2026 19:20
-
The final payload delivered via this chain was assessed to be Cobalt Strike, used for post-exploitation activities.
First reported: 22.05.2026 19:201 source, 1 articleShow sources
- Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware — thehackernews.com — 22.05.2026 19:20
-
Ukraine’s National Security and Defense Council reported Russia’s use of AI tools (OpenAI ChatGPT, Google Gemini) to scout targets and embed AI in malware for runtime command generation.
First reported: 22.05.2026 19:201 source, 1 articleShow sources
- Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware — thehackernews.com — 22.05.2026 19:20
-
Ukraine’s Council noted that Kremlin-backed groups focused on intelligence gathering, long-term persistence, and influence operations in 2025, with initial penetration vectors including social engineering, vulnerability exploitation, compromised RDP/VPN accounts, supply chain attacks, and unlicensed software.
First reported: 22.05.2026 19:201 source, 1 articleShow sources
- Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware — thehackernews.com — 22.05.2026 19:20
-
A pro-Kremlin propaganda campaign hijacked real Bluesky accounts to post fake content since 2024, attributed to Moscow-based Social Design Agency linked to the Matryoshka operation.
First reported: 22.05.2026 19:201 source, 1 articleShow sources
- Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware — thehackernews.com — 22.05.2026 19:20
Similar Happenings
PhantomCaptcha Campaign and CANFAIL Malware Attacks Targeting Ukraine Aid and Government Groups
A coordinated spear-phishing campaign, dubbed PhantomCaptcha, targeted organizations involved in Ukraine's war relief efforts. The campaign delivered a remote access trojan (RAT) using a WebSocket for command-and-control (C2). The attack took place on October 8, 2025, and impersonated the Ukrainian President's Office, using weaponized PDFs and fake Zoom meetings to trick victims into executing malicious PowerShell commands. The malware performed reconnaissance and enabled remote command execution and data exfiltration. The campaign targeted members of the International Red Cross, Norwegian Refugee Council, UNICEF Ukraine, Council of Europe's Register of Damage for Ukraine, and Ukrainian regional government administrations. The malware was hosted on Russian-owned infrastructure and connected to a remote WebSocket server for C2 operations. The campaign took six months to prepare and involved a sophisticated multi-stage spear-phishing operation, with the weaponized PDF appearing as a legitimate governmental communique. The attack chain included a heavily obfuscated PowerShell downloader to bypass signature-based defenses and hinder analysis. The second-stage payload collected various user data, which was XOR-encrypted and sent to the C2 server. The final payload was a lightweight PowerShell backdoor that repeatedly reconnected to the remote WebSocket server. The campaign demonstrated extensive operational planning, compartmentalized infrastructure, and deliberate exposure control, with the infrastructure active only for a single day. A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) described the hack group as possibly affiliated with Russian intelligence services. The threat actor is assessed to have targeted defense, military, government, and energy organizations within the Ukrainian regional and national governments. The group has also exhibited growing interest in aerospace organizations, manufacturing companies with military and drone ties, nuclear and chemical research organizations, and international organizations involved in conflict monitoring and humanitarian aid in Ukraine.
COLDRIVER APT Group Uses ClickFix Tactics to Deliver BAITSWITCH and SIMPLEFIX Malware
The COLDRIVER APT group, also known as Star Blizzard, has intensified its operations since May 2025, rapidly developing and refining its malware arsenal. The group has launched a new campaign using ClickFix tactics to deliver three new malware families: NOROBOT, YESROBOT, and MAYBEROBOT. These malware families are connected via a delivery chain and target individuals and organizations connected to Russia, including NGOs, human rights defenders, and think tanks. The attack chain involves tricking victims into running a malicious DLL via a fake CAPTCHA check, leading to the deployment of the SIMPLEFIX backdoor. The malware exfiltrates specific file types and establishes communication with a command-and-control server. The campaign aligns with COLDRIVER's known victimology, focusing on civil society members connected to Russia. The group has been active since 2019, using spear-phishing and custom tools like SPICA and LOSTKEYS. The latest campaign demonstrates the group's continued use of effective infection vectors, despite their lack of technical sophistication. The malware families NOROBOT and MAYBEROBOT are tracked by Zscaler ThreatLabz under the names BAITSWITCH and SIMPLEFIX, respectively. The COLDRIVER group has been deploying the new malware set more aggressively than any previous campaigns. The new malware set replaces the previous primary malware LOSTKEYS, which has not been observed since its public disclosure in May 2025. The attack starts with a 'ClickFix-style' phishing lure, a fake CAPTCHA page designed to trick the victim into thinking they must verify they’re 'not a robot'. The malware uses a split-key cryptography scheme, with parts of the decryption key hidden in downloaded files and the Windows Registry. The malware fetches a self-extracting Python 3.8 installer, two encrypted Python scripts, and a scheduled task to ensure persistence. The Python scripts are combined to decrypt and launch a minimal Python-based first-stage backdoor that communicates with a hardcoded command-and-control (C2) server. The COLDRIVER group abandoned YESROBOT after just two weeks due to its cumbersome and easily detectable nature. The COLDRIVER group switched to MAYBEROBOT, a more flexible PowerShell-based backdoor, around June 2025. MAYBEROBOT uses a custom C2 protocol with commands to download and execute files, run commands via cmd.exe, and execute PowerShell blocks. The COLDRIVER group has been constantly evolving the NOROBOT malware to evade detection systems. The group has been using the NOROBOT and MAYBEROBOT malware families on targets previously compromised through phishing to acquire additional intelligence value from information on their devices directly. The PhantomCaptcha campaign targeted Ukrainian regional government administration and organizations critical for the war relief effort, including the International Committee of the Red Cross, UNICEF, and various NGOs. The campaign began on October 8, 2025, and used a malicious "I am not a robot" CAPTCHA challenge to execute a PowerShell command, installing malware on victims' systems. The malware operated in three stages: a downloader script, a reconnaissance module, and a WebSocket-based RAT. The campaign's infrastructure was active for just one day, with backend servers remaining online to manage infected devices. The PhantomCaptcha campaign is linked to a wider operation involving malicious Android apps disguised as adult entertainment or cloud storage services. The latest incidents were reported in May and June 2025 by two organizations, including Reporters Without Borders (RSF). The group is known for impersonating trusted contacts and prompting targets to request missing or malfunctioning attachments. In one case involving RSF in March 2025, a ProtonMail address mimicking a legitimate contact sent a French-language email asking a core member to review a document. No file was attached. When the member requested it, the operators replied in English with a link routed through a compromised website to a ProtonDrive URL. However, the file itself could not be retrieved because ProtonMail had blocked the associated account. A second victim received a file labeled as a PDF that was actually a ZIP archive disguised with a .pdf extension. The final stage of the attack used a typical Calisto decoy PDF that claimed to be encrypted and instructed the user to open it in ProtonDrive. The link again sent the target through a redirector hosted on a compromised website. The phishing kit analyzed by TDR, located on account.simpleasip[.]org, appeared to be custom built. It targeted ProtonMail accounts using an Adversary-in-the-Middle (AiTM) setup that relays two-factor authentication (2FA). Analysts found injected JavaScript designed to keep the cursor locked to the password field and to interact with an attacker-controlled API for handling CAPTCHA and 2FA prompts. Star Blizzard's infrastructure included servers hosting phishing pages and others serving as API endpoints. Many domains were tied to Namecheap services, while some earlier ones were registered via Regway to help analysts track the cluster over time.