A group linked to Russian interests has focused on a European financial institution through a social engineering attack designed to gain access and, most likely, data or funds. The operation, detected at the beginning of the month, not only reproduces known techniques of cybercriminals operating against targets in Ukraine, but also suggests a shift of interests to Western organizations that support reconstruction and assistance to the nation at war.
According to the analysis published by the cyber security firm BlueVoyant the attackers made a shipment directed from a false domain that simulated belonging to the Ukrainian judicial system. The mail was addressed to a senior legal and policy adviser of the target agency, a person with privileged access to recruitment processes and financial mechanisms, making that profile a particularly valuable target.

The garbage did not come alone: the message contained a link to a file hosted in a public exchange service (PixelDrain) (pixeldrain.com), a tactic used to dodge controls based on reputation. When you download the compressed package, you start a chain of infection deliberately wrapped in: inside the ZIP there was a RAR file that in turn contained a password-protected 7-Zip. The final goal was an executable that was impersonated by a PDF document taking advantage of the old frame of the double extension (* .pdf.exe).
The execution of that file led to the installation of an MSI that deployed Remote Manipulator System (RMS), a legitimate remote control tool that allows you to take control of desks, share screen and transfer files. The use of legitimate software to maintain persistence and movement within the network is a common practice among sophisticated actors because it reduces detection possibilities by traditional firms. To understand why this technique is problematic, it is enough to remember how attackers take advantage of legitimate programs to hide their activity, which is well described in reference frameworks as MITRE ATT & CK.
The operation has been attributed to a set traced as UAC-0050 - also known in some reports as DaVinci Group - and baptized by BlueVoyant as Mercenary Akula. This actor has a history of using both legitimate remote access tools (like LiteManager) and remote access Trojans (e.g. RemcosRAT) in attacks on Ukrainian targets. The Ukrainian authorities, through CERT-UA, have described UAC-0050 as a mercenary group with ties to Russian security agencies, dedicated to collecting data, stealing funds and conducting disinformation operations under brands such as Fire Cells ( see communication).
Beyond the specific case, international experts and reports point to a worrying trend: the operations of Russian-linked actors seem increasingly aimed at obtaining actionable intelligence that facilitates post-post physical or financial attacks. One example is recently published information that indicates that cyber attacks on the Ukrainian energy infrastructure have sought to prioritize data collection to guide missile attacks, rather than just cause immediate interruptions ( The Record).
In parallel, large cyber-security firms anticipate that these adversaries will not only maintain their aggressiveness, but will also expand the spectrum of victims. In its annual report, CrowdStrike It highlights how groups like APT29 (Cozy Bear) have perfected speed-phishing campaigns that exploit relationships of trust, supplanting real people and using committed accounts to make their communications more credible. This investment in authenticity makes targeted attacks an even more dangerous threat to NGOs, legal entities and actors working with Ukraine.
What differentiates from the intrusion that BlueVoyant relates is, in addition to the technical complexity of the malicious packaging, the chosen goal: a figure with responsibility for shopping and finance. Such profiles can provide direct access to critical information or channels from which to move or hide funds, which reinforces the idea that current attacks combine purposes of espionage, fraud and economic sabotage.
For organizations and professionals working in environments related to reconstruction or international aid, the lesson is clear: targeted threats use increasingly polished means to go through legitimate communications and rely on common tools to avoid alarms. Although there is no infallible barrier, awareness of domain supplanting, mistrust of compressed files from unexpected links and verification by alternative channels before opening attachments can significantly reduce the risk.

On the strategic level, the evolution of these campaigns confirms two points: on the one hand, that the actors with state / parastatal orientation continue to engage mercenary groups for hybrid operations; on the other, that the border between cybercrime and intelligence operations is diffused, causing incidents that at first sight seek profit also to pursue intelligence collection objectives with potentially lethal consequences in the physical world.
For those who want to deepen, the BlueVoyant report provides the technical detail of the case ( source), CERT-UA keeps alerts about the tactics of UAC-0050 ( see note), and analysis of trends in signatures such as CrowdStrike contextualize these incidents within a broader pattern of cyberintelligence operations ( annual report). The Record's account of the use of cyber attacks to guide physical attacks is also a relevant reading to understand the hybrid dimension of these threats ( analysis).
In short, intrusion against the European institution is not an isolated case but another chapter in a broader campaign where actors with geopolitical motivations take advantage of social engineering techniques, public file exchange infrastructure and legitimate software to enter, remain and extract value. The best response remains a combination of technical monitoring, continuing staff training and international cooperation between cyber security teams and authorities.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...