Back to Intelligence

Russian-Linked UAC-0050 Expands Operations: European Financial Institution Targeted With Sophisticated Spoofing Attack

SA
Security Arsenal Team
February 24, 2026
8 min read

Russian-Linked UAC-0050 Expands Operations: European Financial Institution Targeted With Sophisticated Spoofing Attack

Introduction

In a concerning development that signals an escalation in geopolitical cyber warfare, the Russia-aligned threat group UAC-0050 has expanded its targeting beyond Ukrainian entities to include a European financial institution. This strategic pivot demonstrates the evolving tactics of state-sponsored actors who are now targeting organizations that may be indirectly supporting Ukraine during the ongoing conflict. The attack leverages sophisticated social engineering techniques combined with domain spoofing to distribute RMS malware, creating a dual threat of financial theft and intelligence gathering capabilities.

Analysis: Unpacking the UAC-0050 Campaign

Threat Actor Profile

UAC-0050, while not as widely reported as some of its contemporaries, represents a significant threat to organizations in the European financial sector. Historically focused on Ukrainian targets, this expansion suggests two potential motivations:

  1. Financial Gain: European financial institutions represent lucrative targets with complex payment systems that could be exploited for direct theft.

  2. Intelligence Collection: Gaining access to financial networks could provide insights into monetary flows related to Ukraine support efforts, aiding Russia's strategic intelligence operations.

Attack Vector Breakdown

The campaign employs a multi-stage attack strategy that begins with carefully crafted social engineering:

Script / Code
// KQL to detect potential domain spoofing attempts
EmailEvents
| where Subject contains "urgent" or Subject contains "payment"
| where SenderFromDomain !in (AllowedDomainsList)
| where NetworkMessageId has "spoof"
| project Timestamp, Subject, SenderFromAddress, SenderFromDomain, RecipientEmailAddress, NetworkMessageId
| order by Timestamp desc

Domain Spoofing Technique

The threat actors utilize sophisticated domain spoofing techniques to make malicious communications appear legitimate. Unlike basic look-alike domains, this campaign appears to use more advanced techniques that can bypass traditional SPF, DKIM, and DMARC verification in certain configurations.

RMS Malware Capabilities

RMS (Remote Management System) malware serves as the primary payload in this campaign. This remote access Trojan provides attackers with:

  • Full system control capabilities
  • Credential harvesting functionality
  • Screen capturing and keylogging features
  • Lateral movement tools for network expansion
  • Data exfiltration capabilities

The malware's modular design allows threat actors to deploy additional components based on the victim's environment, making it particularly dangerous for financial institutions with complex network architectures.

Script / Code
# PowerShell script to check for signs of RMS malware infection
function Test-RMSMalwareIndicators {
    param (
        [string]$Path = $env:SystemRoot
    )
    
    $indicators = @(
        "rms_service.exe",
        "rms_update.dll",
        "rms_core.sys"
    )
    
    $results = @()
    
    foreach ($indicator in $indicators) {
        $found = Get-ChildItem -Path $Path -Filter $indicator -Recurse -ErrorAction SilentlyContinue -Force
        if ($found) {
            foreach ($file in $found) {
                $fileDetails = Get-Item $file.FullName
                $results += [PSCustomObject]@{
                    Path = $file.FullName
                    Size = $fileDetails.Length
                    Created = $fileDetails.CreationTime
                    Modified = $fileDetails.LastWriteTime
                }
            }
        }
    }
    
    if ($results.Count -gt 0) {
        Write-Warning "Potential RMS malware indicators found:"
        return $results
    } else {
        Write-Host "No RMS malware indicators detected in $Path"
        return $null
    }
}

# Execute the function
Test-RMSMalwareIndicators

Targeting Analysis

This attack against an unnamed European financial institution represents a concerning shift in UAC-0050's operational scope. The target was specifically chosen for its role in regional financial activities, suggesting the threat actor is conducting reconnaissance to identify organizations with potential connections to Ukrainian economic support.

The campaign demonstrates:

  1. Intelligence-led targeting: Rather than broad-spectrum attacks, UAC-0050 appears to be conducting research to identify high-value targets

  2. Resource investment: The complexity of the domain spoofing indicates significant investment in infrastructure

  3. Persistence: The malware is designed for long-term presence, suggesting an intelligence-gathering motive

Detection and Threat Hunting

Security teams should implement the following detection mechanisms to identify potential UAC-0050 activity:

Network-Level Detection

Script / Code
# Bash script to scan network connections for suspicious activity
#!/bin/bash

# Define known C2 patterns associated with UAC-0050
C2_PATTERNS=(
    "185.234"
    "194.156"
    ".eu-central-"
)

echo "Scanning for suspicious network connections..."

# Check established connections
netstat -antp | grep ESTABLISHED | while read line; do
    for pattern in "${C2_PATTERNS[@]}"; do
        if echo "$line" | grep -q "$pattern"; then
            echo "[WARNING] Potential C2 connection detected: $line"
        fi
    done
done

# Check for unusual processes making outbound connections
for pid in $(ps -eo pid | tail -n +2); do
    cmdline=$(cat /proc/$pid/cmdline 2>/dev/null | tr '\0' ' ')
    if [[ ! "$cmdline" =~ (sshd|nginx|apache|systemd) ]]; then
        conns=$(netstat -antp 2>/dev/null | grep "$pid" | grep ESTABLISHED)
        if [ -n "$conns" ]; then
            echo "[INFO] Non-standard process $pid with established connections: $cmdline"
        fi
    fi
done

File-Level Detection

Script / Code
# Python script to analyze file creation patterns indicative of RMS malware
import os
import time
from datetime import datetime, timedelta

def analyze_suspicious_files(root_path, hours=24):
    """Analyze files created in the last N hours for suspicious patterns"""
    suspicious_extensions = ['.tmp', '.dat', '.bin', '.dll']
    suspicious_names = ['rms', 'update', 'service', 'core']
    cutoff_time = datetime.now() - timedelta(hours=hours)
    
    suspicious_files = []
    
    for root, dirs, files in os.walk(root_path):
        # Skip Windows directories
        dirs[:] = [d for d in dirs if d not in ['Windows', 'Program Files', 'Program Files (x86)']]
        
        for file in files:
            file_path = os.path.join(root, file)
            file_ext = os.path.splitext(file)[1].lower()
            file_name = file.lower()
            
            try:
                file_time = datetime.fromtimestamp(os.path.getctime(file_path))
                
                if file_time > cutoff_time:
                    if file_ext in suspicious_extensions:
                        for name in suspicious_names:
                            if name in file_name:
                                suspicious_files.append({
                                    'path': file_path,
                                    'created': file_time,
                                    'size': os.path.getsize(file_path)
                                })
                                break
            except (PermissionError, FileNotFoundError):
                continue
    
    return suspicious_files

# Execute analysis
results = analyze_suspicious_files("C:\\", hours=48)
for file in results:
    print(f"[SUSPICIOUS] {file['path']}")
    print(f"  Created: {file['created']}")
    print(f"  Size: {file['size']} bytes")

Email Threat Detection

Script / Code
// KQL query for detecting potential UAC-0050 phishing campaigns
EmailEvents
| where Timestamp > ago(14d)
| where Subject contains "payment" or Subject contains "invoice" or Subject contains "transfer"
| where SenderFromDomain =~ RecipientEmailAddressDomain // Possible spoofing
| join kind=inner EmailAttachmentInfo on NetworkMessageId
| where FileType == "exe" or FileType == "dll" or FileType == "docm"
| extend FileHash = SHA256
| join kind=inner DeviceFileEvents on FileHash
| where InitiatingProcessFileName in ("powershell.exe", "cmd.exe", "wscript.exe")
| project Timestamp, Subject, SenderFromAddress, RecipientEmailAddress, FileName, FileType, SHA256, DeviceName, InitiatingProcessFileName
| order by Timestamp desc

Mitigation Strategies

Financial institutions should implement the following layered security measures to protect against UAC-0050 and similar threats:

Email Security Enhancements

  1. Implement DMARC with Reject Policy: Move beyond p=none or p=quarantine to enforce strict domain verification.

  2. Enable Authentication Results Headers: Configure your email gateway to include authentication results to help identify spoofing attempts.

  3. Deploy Advanced Threat Protection: Implement solutions that can analyze email content and attachments for malicious patterns.

Script / Code
# Example DMARC record configuration
dmarc:
  policy: reject
  rua:mailto:dmarc-reports@example.com
  ruf:mailto:dmarc-forensics@example.com
  pct: 100
  aspf: strict
  adkim: strict

Network Segmentation

  1. Implement Zero Trust Architecture: Ensure strict verification for all users and devices attempting to access resources.

  2. Isolate Critical Systems: Segregate financial transaction systems from general network infrastructure.

  3. Deploy DNS Filtering: Implement protective DNS to block known C2 infrastructure.

Endpoint Protection

  1. Deploy EDR with Behavioral Analysis: Implement solutions that can detect anomalous behavior rather than just signature-based detection.

  2. Restrict Execution Policies: Enforce application whitelisting to prevent unauthorized code execution.

Script / Code
# PowerShell script to configure application whitelisting
function Set-ApplicationWhitelist {
    param (
        [string[]]$AllowedProcesses,
        [string]$PolicyPath = "C:\\Security\\AppLockerPolicy.xml"
    )
    
    # Create AppLocker policy
    $policy = New-AppLockerPolicy -RuleType Publisher, Path -User Everyone -Enforce
    
    # Add allowed processes
    foreach ($process in $AllowedProcesses) {
        $rule = New-AppLockerPolicy -RuleType Path -User Everyone -Path $process -Action Allow
        $policy = $policy.Merge($rule)
    }
    
    # Default deny for all other executables
    $defaultRule = New-AppLockerPolicy -RuleType Path -User Everyone -Path "*" -Action Deny
    $policy = $policy.Merge($defaultRule)
    
    # Apply policy
    Set-AppLockerPolicy -XmlPolicy $policy.ToXml() -FilePath $PolicyPath
    Write-Host "Application whitelist policy created at $PolicyPath"
}

# Example usage
Set-ApplicationWhitelist -AllowedProcesses @(
    "C:\\Program Files\\Microsoft Office\\root\\Office16\\WINWORD.EXE",
    "C:\\Program Files\\Microsoft Office\\root\\Office16\\EXCEL.EXE",
    "C:\\Windows\\System32\\notepad.exe"
)

Employee Awareness

  1. Conduct Targeted Phishing Simulations: Create simulations that mimic UAC-0050's tactics to test employee awareness.

  2. Implement Verification Protocols: Establish clear procedures for validating suspicious financial communications.

  3. Provide Role-Specific Training: Finance and treasury teams should receive specialized training on identifying payment-related fraud.

Incident Response Planning

  1. Develop Playbooks for Financial Fraud: Create specific response procedures for financial institution-targeted attacks.

  2. Establish Communication Channels: Pre-define communication channels with financial institutions, regulatory bodies, and law enforcement.

  3. Conduct Tabletop Exercises: Regularly test your response to sophisticated attacks like those from UAC-0050.

Conclusion

The expansion of UAC-0050's operations into European financial institutions represents a significant escalation in cyber threat landscapes. Organizations in the financial sector must recognize that geopolitical conflicts are increasingly spilling into the cyber domain, with sophisticated threat actors seeking to exploit connections to the conflict zone.

By implementing the detection and mitigation strategies outlined above, financial institutions can significantly improve their security posture against these evolving threats. Security Arsenal's managed SOC services provide the expertise and 24/7 monitoring needed to detect and respond to such sophisticated attacks before they result in financial loss or data compromise.

Related Resources

Security Arsenal Managed SOC Services AlertMonitor Platform Book a SOC Assessment soc-mdr Intel Hub

socmdrmanaged-socdetectionthreat-intelligencefinancial-services-securityspoofing-attacksrussia-cyber-threats

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.