Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dohdoor Malware Targets U.S. Schools and Healthcare

Dohdoor Malware Targets U.S. Schools and Healthcare

Posted on February 27, 2026 By CWS

A newly identified malware campaign, known as Dohdoor, has been targeting educational and healthcare institutions in the United States since December 2025. This threat, associated with the group labeled UAT-10027, employs a sophisticated backdoor to stealthily infiltrate and maintain access within affected systems.

How Dohdoor Operates

The Dohdoor malware distinguishes itself through its use of DNS-over-HTTPS (DoH) for communication with its command-and-control (C2) servers. This method disguises malicious communications as normal HTTPS traffic, thereby eluding detection. The attackers further enhance this deception by mimicking legitimate software updates, using subdomain names that resemble known services.

The campaign employs irregularly capitalized domains like “.OnLiNe” and “.DeSigN” to bypass standard security filters. This strategy, coupled with the misuse of Windows executables, helps the malware blend into everyday network activities.

Technical Details of the Attack

Analysis by Cisco Talos reveals that the malware’s entry point is often a phishing email delivering a PowerShell script. This script then downloads a malicious batch file, which initiates a sequence of actions designed to install Dohdoor with minimal detection. The malware uses techniques such as DLL sideloading to execute within the system.

Once operational, Dohdoor communicates with its C2 server using encrypted DNS queries. It then downloads and decrypts additional payloads, which are injected into legitimate processes to avoid detection by security software.

Defensive Measures and Attribution

To counteract this threat, organizations are advised to monitor for unusual HTTPS traffic and employ DNS security measures. Tools like ClamAV and Snort can assist in detecting and blocking Dohdoor’s activities. Observations suggest that UAT-10027 might have connections to North Korea’s Lazarus Group, given the similarities in techniques and domain usage.

Educational and healthcare sectors are particularly vulnerable due to limited cybersecurity resources. Therefore, implementing robust security protocols and staying informed about emerging threats is crucial for safeguarding sensitive data.

Stay updated on cybersecurity news and insights by following us on Google News, LinkedIn, and X.

Cyber Security News Tags:ClamAV, Cobalt Strike, Cybersecurity, DNS-over-HTTPS, Dohdoor, Education, Healthcare, Malware, Phishing, Snort, UAT-10027

Post navigation

Previous Post: Over 900 FreePBX Systems Infected in Web Shell Attacks
Next Post: DoJ Seizes Tether in Major Crypto Scam Crackdown

Related Posts

Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials Cyber Security News
F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands Cyber Security News
Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet Cyber Security News
APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities Cyber Security News
Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites Cyber Security News
New Unauthenticated DoS Vulnerability Crashes Next.js Servers with a Single Request New Unauthenticated DoS Vulnerability Crashes Next.js Servers with a Single Request Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Trump Directs Federal Agencies to Cease Anthropic Technology
  • Aeternum C2: Unstoppable Botnet Leveraging Blockchain
  • DoJ Seizes Tether in Major Crypto Scam Crackdown
  • Dohdoor Malware Targets U.S. Schools and Healthcare
  • Over 900 FreePBX Systems Infected in Web Shell Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Trump Directs Federal Agencies to Cease Anthropic Technology
  • Aeternum C2: Unstoppable Botnet Leveraging Blockchain
  • DoJ Seizes Tether in Major Crypto Scam Crackdown
  • Dohdoor Malware Targets U.S. Schools and Healthcare
  • Over 900 FreePBX Systems Infected in Web Shell Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News