Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Mercenary Akula Hits Ukraine-Supporting Financial...

0
Medium
Published: Wed Feb 25 2026 (02/25/2026, 11:35:21 UTC)
Source: AlienVault OTX General

Description

A European financial institution involved in regional development and reconstruction initiatives was targeted by a social engineering attack attributed to the Russia-aligned Mercenary Akula. The attack used a spoofed Ukrainian judicial domain to deliver an email containing a link to a remote access payload. The target was a senior legal and policy advisor involved in procurement. The attack employed a multi-stage extraction process and deployed the Remote Manipulator System, a legitimate remote administration tool. This incident suggests the adversary may be expanding beyond primarily Ukraine-based targeting, potentially probing Ukraine-supporting institutions in Western Europe. The attack aligns with Mercenary Akula's established tactics, including localized social engineering, multi-stage payload delivery, and the use of signed remote administration tools.

AI-Powered Analysis

AILast updated: 02/25/2026, 12:11:01 UTC

Technical Analysis

Mercenary Akula, a Russia-aligned threat actor, conducted a targeted cyber espionage and financial theft campaign against a European financial institution engaged in regional development and reconstruction initiatives supporting Ukraine. The attack was initiated via a spearphishing email crafted to appear from a legitimate Ukrainian judicial domain, enhancing the credibility of the social engineering attempt. The email contained a link that, when clicked, triggered a multi-stage payload delivery process culminating in the deployment of the Remote Manipulator System (RMS), a legitimate remote administration tool often abused by threat actors for stealthy remote access. The targeted user was a senior legal and policy advisor involved in procurement, suggesting the adversary's intent to access sensitive procurement and policy information. The attack chain leveraged several MITRE ATT&CK techniques, including spearphishing (T1566.002), multi-stage payload delivery (T1560.001), bypassing User Account Control (T1548.002), persistence mechanisms (T1547.001), and command and control over standard application layer protocols (T1071.001). The use of signed remote administration tools like RMS helps evade detection by security solutions. This incident indicates Mercenary Akula's strategic shift to probe Ukraine-supporting institutions in Western Europe, expanding their targeting scope beyond Ukraine itself. The attack aligns with Mercenary Akula's established modus operandi characterized by localized social engineering, multi-stage extraction, and the use of legitimate tools for remote access and persistence. No known public exploits or CVEs are associated with this campaign, and the threat remains under active monitoring.

Potential Impact

This threat poses significant risks to organizations involved in Ukraine-related financial and reconstruction activities, particularly in Europe. Successful compromise can lead to unauthorized access to sensitive legal, policy, and procurement information, enabling espionage and potential financial theft. The use of legitimate remote administration tools complicates detection and response, increasing dwell time and potential data exfiltration. The targeting of senior advisors indicates a focus on high-value information that could influence regional development projects or sanctions enforcement. The expansion of Mercenary Akula's targeting to Western Europe suggests a broader geopolitical intent to disrupt or surveil Ukraine-supporting institutions, potentially affecting diplomatic, financial, and reconstruction efforts. Organizations worldwide with ties to Ukraine or involved in related financial sectors may face increased risk of similar targeted attacks. The medium severity reflects the moderate ease of exploitation via spearphishing combined with the high impact of potential data compromise and espionage.

Mitigation Recommendations

Organizations should implement targeted anti-phishing training focused on recognizing localized and contextually relevant spearphishing attempts, especially those impersonating trusted regional entities. Deploy advanced email filtering solutions capable of detecting domain spoofing and malicious links, including domain-based message authentication, reporting, and conformance (DMARC) enforcement. Monitor for the use of legitimate remote administration tools like RMS within the network, employing behavioral analytics to detect anomalous usage patterns. Implement strict access controls and multi-factor authentication (MFA) for privileged users, particularly those in legal, policy, and procurement roles. Conduct regular threat hunting exercises focusing on multi-stage payload delivery indicators and persistence mechanisms aligned with MITRE ATT&CK techniques T1560.001, T1547.001, and T1071.001. Maintain up-to-date endpoint detection and response (EDR) solutions capable of identifying suspicious command and control traffic and lateral movement. Establish incident response plans that include rapid containment and forensic analysis of suspected spearphishing incidents. Collaborate with regional cybersecurity information sharing organizations to stay informed about evolving tactics of Mercenary Akula and similar threat actors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.bluevoyant.com/blog/mercenary-akula-hits-financial-institution"]
Adversary
Mercenary Akula
Pulse Id
699ede794dd30674f7d583d5
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash4a30f95113ce15731741e4faa701b060
hash985822ace25a47e9ecce96647fa93f7b
hashcd2f93e83f7c06de3f74cd6169463688
hashe706d01579dad025db310c40833c0c52
hash0a0f530b89a87b2f66d930ce6347ae4efba09fad
hash119da9eb82057ee4b0c639db41c78fec9e4537ea
hash24d842f5744497dfefe1dcb0538759f89a8ae918
hash73de36a5dabebd168e5341d3a8dddb26234a036f
hash28926919956c3e3f281f504c45dfe3419d4f37683806f76393f2a7c6d6e1abfa
hash3d99abebdc72cd840ff42b3a5b4cf6e8e3a50616881097d0ceb058f87d2b3909
hash42de03e314c4c9fd69cb042833e8d25950b0a842c28e9b2e18f363c843a9d283
hash4f20691c7890e20af642763d030c608a96a84182e44c902aaa89d4f1394dac0a
hash690ee1907bfb425a791e255eabe7351903e8a9e92089a099997afa2a8070383b
hash761d4add56e0766e7e6314950d5cf4ebf759d43c75e74375c2a65f29040dd6fd
hash9b61bb9374de332fd80909f30d102043befcd569d264715b0a4d5d5a8d0762d3
hashcd652cb4dcbc0c077bc4772fde6e7654be399517879201b820147abb58d2b9bd
hashd9e1a79bd2aef55b73b9d4cbc7983a77f918ea6fc344ab9c59e35bc8afaaff6f
hashf5ab8640a0ae68f25dcd0a7461266a46322f01a790fec8dafe7ec32a535e5d8e

Threat ID: 699ee338b7ef31ef0b0201d2

Added to database: 2/25/2026, 11:55:36 AM

Last enriched: 2/25/2026, 12:11:01 PM

Last updated: 2/26/2026, 4:49:35 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats