Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dohdoor Backdoor Threatens U.S. Education & Healthcare

Dohdoor Backdoor Threatens U.S. Education & Healthcare

Posted on February 26, 2026 By CWS

A newly identified cyber threat, designated as UAT-10027, is actively targeting the education and healthcare sectors in the United States. This malicious campaign, which began in December 2025, is orchestrated to deploy a novel backdoor known as Dohdoor. Cisco Talos has been closely monitoring this threat, which leverages advanced techniques for its operations.

Innovative Methods in Cyber Attacks

The Dohdoor malware utilizes DNS-over-HTTPS (DoH) for its command-and-control communications, allowing it to clandestinely download and execute additional payloads. According to security experts Alex Karkins and Chetan Raghuprasad, the initial method of infiltration is suspected to involve social engineering via phishing, which triggers a PowerShell script execution.

This script subsequently downloads a Windows batch script from a remote server, facilitating the installation of a malicious DLL, identified as either “propsys.dll” or “batmeter.dll.” The execution of this DLL is achieved through DLL side-loading, using legitimate Windows executables such as “Fondue.exe” and “mblctr.exe.” This process enables the backdoor to directly inject further malicious payloads into the victim’s system memory.

Stealth Techniques and Evasion

Dohdoor’s operations are expertly concealed by hiding its command-and-control servers behind Cloudflare’s infrastructure. This strategy ensures that all outbound traffic from compromised systems resembles legitimate HTTPS communications, evading traditional security detection mechanisms such as DNS-based monitoring and network traffic analysis tools. Additionally, the malware unhooks system calls to bypass endpoint detection and response (EDR) systems that typically monitor Windows API activity.

Despite the sophistication of the attack, the identity of those behind UAT-10027 remains unknown. However, there are noted technical similarities between Dohdoor and Lazarloader, a tool previously associated with the North Korean hacking group Lazarus, known for targeting South Korean entities.

Implications and Future Outlook

While UAT-10027 shares certain characteristics with North Korean APT groups, its focus on U.S. education and healthcare sectors marks a deviation from Lazarus’s usual targets, such as cryptocurrency and defense industries. This suggests a potential shift in strategy or involvement of different actors within the broader landscape of state-sponsored cyber threats.

Given the threat’s complexity and potential impact, organizations in the affected sectors are advised to enhance their cybersecurity measures, particularly focusing on detecting and mitigating phishing attempts and unusual DNS activities. As the situation evolves, continuous monitoring and adaptation of security strategies will be crucial to safeguarding sensitive data and infrastructure.

The Hacker News Tags:C2 communications, Cloudflare, Cobalt Strike, Cybersecurity, DLL side-loading, DNS-over-HTTPS, Dohdoor, education sector, healthcare sector, Malware, North Korean APT, Phishing, threat intelligence, UAT-10027

Post navigation

Previous Post: Belarusian Spyware ResidentBat Targets Journalists with Precision
Next Post: Oblivion RAT: New Android Threat with Hidden Control

Related Posts

AI Browsers Vulnerable to Phishing Attacks: A Security Concern AI Browsers Vulnerable to Phishing Attacks: A Security Concern The Hacker News
Google Addresses Critical Chrome Zero-Day Vulnerability Google Addresses Critical Chrome Zero-Day Vulnerability The Hacker News
Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code The Hacker News
FortiGate Exploits Highlight Ongoing Cyber Threats FortiGate Exploits Highlight Ongoing Cyber Threats The Hacker News
DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware The Hacker News
Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Nginx 1.29.8 & FreeNginx Update Bolster Security
  • Maximize SOC ROI with Advanced Threat Intelligence
  • LinkedIn Under Scrutiny: Allegations of Privacy Invasion
  • FBI and Indonesian Police Disrupt W3LL Phishing Scheme
  • Mozilla Critiques Microsoft’s Copilot Installation Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Nginx 1.29.8 & FreeNginx Update Bolster Security
  • Maximize SOC ROI with Advanced Threat Intelligence
  • LinkedIn Under Scrutiny: Allegations of Privacy Invasion
  • FBI and Indonesian Police Disrupt W3LL Phishing Scheme
  • Mozilla Critiques Microsoft’s Copilot Installation Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark