Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Ukraine’s Cybersecurity Comedy: Phishing for Notaries with a Side of Malware Mayhem!
CERT-UA warns of a cyber attack by UAC-0173, infecting Ukrainian notaries with the DCRat trojan. The attack chain uses phishing emails posing as the Ministry of Justice to spread the malware. The campaign exploits Cloudflare, RDPWRAPPER, and other tools to steal data and send more malicious emails.

Hot Take:
Looks like the cybercriminals are at it again, showing us that even in 2025, phishing emails are still the bread and butter of hacking attempts. Who knew the Ministry of Justice moonlighted as a malware delivery service? Better double-check those sender addresses, folks. The only thing scarier than a RAT in your computer is the fact that these hackers might just be in the wrong business; they should consider a career in logistics with how well they’re orchestrating these attacks!
Key Points:
- UAC-0173 group targets Ukrainian notaries with DCRat malware via phishing emails.
- Attack uses Cloudflare’s R2 to host malicious executables.
- Additional tools like RDPWRAPPER, FIDDLER, and XWorm enhance the attack’s impact.
- Compromised systems spread further attacks using SENDMAIL utility.
- Sandworm sub-cluster exploits Microsoft Windows flaw, targeting multiple countries.