home.social

#uac0050 — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #uac0050, aggregated by home.social.

  1. Operational summary:
    Threat actor: UAC-0050
    Alias: DaVinci Group / Mercenary Akula (per BlueVoyant)
    Tooling: RMS (Remote Manipulator System)
    Delivery: Spear-phishing, spoofed judicial domain, layered archives
    TTP alignment consistent with reporting from CERT-UA.

    Strategic overlay:
    Russia-nexus actors, including APT29, continue high-confidence trust exploitation campaigns, as outlined by CrowdStrike.

    Detection priorities:
    - Monitor MSI execution anomalies
    - Flag double-extension binaries
    - Inspect outbound RMS traffic
    - Harden executive email authentication
    Follow for tactical intelligence briefings.
    Comment with detection engineering recommendations.

    #Infosec #ThreatIntel #UAC0050 #APT29 #RMS #SpearPhishing #DetectionEngineering #CyberEspionage #SOC #BlueTeam #SecurityOperations