Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dohdoor Backdoor Threatens U.S. Education & Healthcare

Dohdoor Backdoor Threatens U.S. Education & Healthcare

Posted on February 26, 2026 By CWS

A newly identified cyber threat, designated as UAT-10027, is actively targeting the education and healthcare sectors in the United States. This malicious campaign, which began in December 2025, is orchestrated to deploy a novel backdoor known as Dohdoor. Cisco Talos has been closely monitoring this threat, which leverages advanced techniques for its operations.

Innovative Methods in Cyber Attacks

The Dohdoor malware utilizes DNS-over-HTTPS (DoH) for its command-and-control communications, allowing it to clandestinely download and execute additional payloads. According to security experts Alex Karkins and Chetan Raghuprasad, the initial method of infiltration is suspected to involve social engineering via phishing, which triggers a PowerShell script execution.

This script subsequently downloads a Windows batch script from a remote server, facilitating the installation of a malicious DLL, identified as either “propsys.dll” or “batmeter.dll.” The execution of this DLL is achieved through DLL side-loading, using legitimate Windows executables such as “Fondue.exe” and “mblctr.exe.” This process enables the backdoor to directly inject further malicious payloads into the victim’s system memory.

Stealth Techniques and Evasion

Dohdoor’s operations are expertly concealed by hiding its command-and-control servers behind Cloudflare’s infrastructure. This strategy ensures that all outbound traffic from compromised systems resembles legitimate HTTPS communications, evading traditional security detection mechanisms such as DNS-based monitoring and network traffic analysis tools. Additionally, the malware unhooks system calls to bypass endpoint detection and response (EDR) systems that typically monitor Windows API activity.

Despite the sophistication of the attack, the identity of those behind UAT-10027 remains unknown. However, there are noted technical similarities between Dohdoor and Lazarloader, a tool previously associated with the North Korean hacking group Lazarus, known for targeting South Korean entities.

Implications and Future Outlook

While UAT-10027 shares certain characteristics with North Korean APT groups, its focus on U.S. education and healthcare sectors marks a deviation from Lazarus’s usual targets, such as cryptocurrency and defense industries. This suggests a potential shift in strategy or involvement of different actors within the broader landscape of state-sponsored cyber threats.

Given the threat’s complexity and potential impact, organizations in the affected sectors are advised to enhance their cybersecurity measures, particularly focusing on detecting and mitigating phishing attempts and unusual DNS activities. As the situation evolves, continuous monitoring and adaptation of security strategies will be crucial to safeguarding sensitive data and infrastructure.

The Hacker News Tags:C2 communications, Cloudflare, Cobalt Strike, Cybersecurity, DLL side-loading, DNS-over-HTTPS, Dohdoor, education sector, healthcare sector, Malware, North Korean APT, Phishing, threat intelligence, UAT-10027

Post navigation

Previous Post: Belarusian Spyware ResidentBat Targets Journalists with Precision
Next Post: Oblivion RAT: New Android Threat with Hidden Control

Related Posts

New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP The Hacker News
ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation The Hacker News
Python Infostealers Expanding to macOS via Fake Ads Python Infostealers Expanding to macOS via Fake Ads The Hacker News
300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide 300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide The Hacker News
Bridging the Remediation Gap: Introducing Pentera Resolve Bridging the Remediation Gap: Introducing Pentera Resolve The Hacker News
FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cloaking Platform 1Campaign Bypasses Google Ads Security
  • Botnet Uses Polygon Blockchain for Resilient Command Control
  • Fake Zoom Website Exploits 1,437 Users with Spyware
  • Top Risks Boards Must Prioritize in 2026
  • SeaFlower Campaign Targets Web3 Wallets: A Closer Look

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cloaking Platform 1Campaign Bypasses Google Ads Security
  • Botnet Uses Polygon Blockchain for Resilient Command Control
  • Fake Zoom Website Exploits 1,437 Users with Spyware
  • Top Risks Boards Must Prioritize in 2026
  • SeaFlower Campaign Targets Web3 Wallets: A Closer Look

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News