Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dohdoor Backdoor Threatens U.S. Education & Healthcare

Dohdoor Backdoor Threatens U.S. Education & Healthcare

Posted on February 26, 2026 By CWS

A newly identified cyber threat, designated as UAT-10027, is actively targeting the education and healthcare sectors in the United States. This malicious campaign, which began in December 2025, is orchestrated to deploy a novel backdoor known as Dohdoor. Cisco Talos has been closely monitoring this threat, which leverages advanced techniques for its operations.

Innovative Methods in Cyber Attacks

The Dohdoor malware utilizes DNS-over-HTTPS (DoH) for its command-and-control communications, allowing it to clandestinely download and execute additional payloads. According to security experts Alex Karkins and Chetan Raghuprasad, the initial method of infiltration is suspected to involve social engineering via phishing, which triggers a PowerShell script execution.

This script subsequently downloads a Windows batch script from a remote server, facilitating the installation of a malicious DLL, identified as either “propsys.dll” or “batmeter.dll.” The execution of this DLL is achieved through DLL side-loading, using legitimate Windows executables such as “Fondue.exe” and “mblctr.exe.” This process enables the backdoor to directly inject further malicious payloads into the victim’s system memory.

Stealth Techniques and Evasion

Dohdoor’s operations are expertly concealed by hiding its command-and-control servers behind Cloudflare’s infrastructure. This strategy ensures that all outbound traffic from compromised systems resembles legitimate HTTPS communications, evading traditional security detection mechanisms such as DNS-based monitoring and network traffic analysis tools. Additionally, the malware unhooks system calls to bypass endpoint detection and response (EDR) systems that typically monitor Windows API activity.

Despite the sophistication of the attack, the identity of those behind UAT-10027 remains unknown. However, there are noted technical similarities between Dohdoor and Lazarloader, a tool previously associated with the North Korean hacking group Lazarus, known for targeting South Korean entities.

Implications and Future Outlook

While UAT-10027 shares certain characteristics with North Korean APT groups, its focus on U.S. education and healthcare sectors marks a deviation from Lazarus’s usual targets, such as cryptocurrency and defense industries. This suggests a potential shift in strategy or involvement of different actors within the broader landscape of state-sponsored cyber threats.

Given the threat’s complexity and potential impact, organizations in the affected sectors are advised to enhance their cybersecurity measures, particularly focusing on detecting and mitigating phishing attempts and unusual DNS activities. As the situation evolves, continuous monitoring and adaptation of security strategies will be crucial to safeguarding sensitive data and infrastructure.

The Hacker News Tags:C2 communications, Cloudflare, Cobalt Strike, Cybersecurity, DLL side-loading, DNS-over-HTTPS, Dohdoor, education sector, healthcare sector, Malware, North Korean APT, Phishing, threat intelligence, UAT-10027

Post navigation

Previous Post: Belarusian Spyware ResidentBat Targets Journalists with Precision
Next Post: Oblivion RAT: New Android Threat with Hidden Control

Related Posts

5 BCDR Essentials for Effective Ransomware Defense 5 BCDR Essentials for Effective Ransomware Defense The Hacker News
Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices The Hacker News
Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks The Hacker News
TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China The Hacker News
WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens The Hacker News
5 Lessons from River Island 5 Lessons from River Island The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SeaFlower Campaign Targets Web3 Wallets: A Closer Look
  • Apple Devices Approved for NATO Classified Use
  • Kali Linux Update, Chrome Threats & Security Risks Unveiled
  • Oblivion RAT: New Android Threat with Hidden Control
  • Dohdoor Backdoor Threatens U.S. Education & Healthcare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SeaFlower Campaign Targets Web3 Wallets: A Closer Look
  • Apple Devices Approved for NATO Classified Use
  • Kali Linux Update, Chrome Threats & Security Risks Unveiled
  • Oblivion RAT: New Android Threat with Hidden Control
  • Dohdoor Backdoor Threatens U.S. Education & Healthcare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News