Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Ford EV and technology chief leaves automaker

Wait, could they actually break up Live Nation?

Monarch Tractor’s collapse ends with acquisition by Caterpillar

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » UAT-10027 Dohdoor backdoor targets US education and healthcare
Identity

UAT-10027 Dohdoor backdoor targets US education and healthcare

By February 26, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 26, 2026Malware/Threat Intelligence

The previously undocumented cluster of threat activity is believed to stem from an ongoing malicious campaign targeting the education and healthcare sectors in the United States since at least December 2025.

This campaign is tracked by Cisco Talos as UAT-10027. The ultimate goal of the attack is to deliver a never-before-seen backdoor codenamed Dohdoor.

“Dohdoor utilizes DNS-over-HTTPS (DoH) technology for command-and-control (C2) communications and has the ability to reflexively download and execute other payload binaries,” security researchers Alex Karkins and Chetan Raghuprasad said in a technical report shared with The Hacker News.

The initial access vector used in this campaign is currently unknown, but is believed to include the use of social engineering phishing techniques leading to the execution of PowerShell scripts.

The script then downloads and runs the Windows batch script from the remote staging server. This facilitates the download of a malicious Windows dynamic link library (DLL) named ‘propsys.dll’ or ‘batmeter.dll’.

DLL payloads (such as Dohdoor) are launched by legitimate Windows executables (such as “Fondue.exe”, “mblctr.exe”, and “ScreenClippingHost.exe”) using a technique known as DLL sideloading. The backdoor access created by the implant is used to retrieve and execute the next stage payload directly into the victim’s memory. The payload is assessed to be a Cobalt Strike Beacon.

“The attackers hide their C2 servers behind the Cloudflare infrastructure, making all outbound communications from the victim machines appear as legitimate HTTPS traffic to trusted global IP addresses,” Talos said.

“This technology bypasses DNS-based detection systems, DNS sinkholes, and network traffic analysis tools that monitor suspicious domain searches, ensuring that malware C2 communications remain stealth through traditional network security infrastructure.”

Dohdoor has also been found to unhook system calls in order to bypass endpoint detection and response (EDR) solutions that monitor Windows API calls through user-mode hooks in NTDLL.dll.

It is not currently clear who is behind UAT-10027, but Cisco Talos said it has found some tactical similarities between Dohdoor and Lazarloader. Lazarloader is a downloader previously identified as being used by the North Korean hacker group Lazarus in attacks targeting South Korea.

“Although the UAT-10027 malware has technical overlap with the Lazarus Group, the focus of this campaign is on the education and healthcare sectors, deviating from Lazarus’ typical profile of cryptocurrency and defense targets,” Talos concluded.

“but, […] North Korean APT attackers have used Maui ransomware to target the healthcare sector, and another North Korean APT group, Kimsuky, has targeted the education sector, highlighting the overlap between UAT-10027’s victims and those of other North Korean APTs.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSecure the best discounts for Disrupt 2026 | Tech Crunch
Next Article Changing companion animal care

Related Posts

n8n webhook has been exploited since October 2025 to deliver malware via phishing emails

April 15, 2026

Actively exploited nginx-ui flaw (CVE-2026-33032) allows complete takeover of Nginx servers

April 15, 2026

April Patch Tuesday fixes critical flaws for SAP, Adobe, Microsoft, Fortinet, and more

April 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Ford EV and technology chief leaves automaker

Wait, could they actually break up Live Nation?

Monarch Tractor’s collapse ends with acquisition by Caterpillar

High Touch achieves $100 million ARR with AI-powered marketing tools

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.