{"id":66,"date":"2026-02-26T16:12:00","date_gmt":"2026-02-26T16:12:00","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=66"},"modified":"2026-02-26T16:12:00","modified_gmt":"2026-02-26T16:12:00","slug":"uat-10027-targets-u-s-education-and-healthcare-with-dohdoor-backdoor","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=66","title":{"rendered":"UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Feb 26, 2026<\/span><\/span><span class=\"p-tags\">Malware \/ Threat Intelligence<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgJAVofZLLo1DEzVLXd9ahr2wbZLNqwM8K5eVDE8pDM5ossDzBi_U34YB81lu7LBProqz1SirGb7brANr4AQ83_k9Y0RhlcrsKKpl0IBovDLdy1awHNR_dxEV0umYpWUWLWkx7vQqCbunXZ7WnnJooiCvhchGXFwLAdT0LljMY_4MVRGfv2gM8uofci2J7E\/s1700-e365\/healthcare-cyberattack.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025.<\/p>\n<p>The campaign is being tracked by Cisco Talos under the moniker <strong>UAT-10027<\/strong>. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor.<\/p>\n<p>\u00abDohdoor utilizes the DNS-over-HTTPS (DoH) technique for command-and-control (C2) communications and has the ability to download and execute other payload binaries reflectively,\u00bb security researchers Alex Karkins and Chetan Raghuprasad <a href=\"https:\/\/blog.talosintelligence.com\/new-dohdoor-malware-campaign\/\" rel=\"noopener\" target=\"_blank\">said<\/a> in a technical report shared with The Hacker News.<\/p>\n<p>Although the initial access vector used in the campaign is currently not known, it&#8217;s suspected to involve the use of social engineering phishing techniques, leading to the execution of a PowerShell script.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/sse-customer-awards-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5Ij_-TeqFMEsRFzgRRFzSRlVK6oHCncN_eJ2fkOdsA_1tN9HQbAlEEife2Z2JUt1lPv4st5n9KZP84jGEYY9Up6BQ7QE-N5rs6OhzL5thxGzVxnMx3JH9cGRLi9S5Kl-iV5PgjBeTdkBLnv_inF8UUAo88iqdmgJuPIc_6qiPyUMXwFyZWbZvkZkcRXSw\/s728-e100\/gartner-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The script then proceeds to download and run a Windows batch script from a remote staging server, which, for its part, facilitates the download of a malicious Windows dynamic-link library (DLL) that&#8217;s named \u00abpropsys.dll\u00bb or \u00abbatmeter.dll.\u00bb<\/p>\n<p>The DLL payload \u2013 i.e., Dohdoor \u2013 is launched by means of a legitimate Windows executable (e.g., \u00abFondue.exe,\u00bb \u00abmblctr.exe,\u00bb and \u00abScreenClippingHost.exe\u00bb) using a technique referred to as <a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/001\/\" rel=\"noopener\" target=\"_blank\">DLL side-loading<\/a>. The backdoored access created by the implant is used to retrieve a next-stage payload directly into the victim&#8217;s memory and execute it. The payload is assessed to be a Cobalt Strike Beacon.<\/p>\n<p>\u00abThe threat actor hides the C2 servers behind the Cloudflare infrastructure, ensuring that all outbound communication from the victim machine appears as legitimate HTTPS traffic to a trusted global IP address,\u00bb Talos said.\u00a0<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglWVTZH6ZI5o1mqkH_UtqjisYIyJ1thdjxBT8x-QsS32B2ibUFlo4And5uZynTOrYBhmqZcQs7zFyziZemjlRKRV_oCR0xL4IK1-ZU9Sy1g9_uv8g1O800e9sQma9FLDOcZrAgK9ZhDQqLHAUIb_fL5fkKXWz32y2l0Z4MM5d0IpJKcBOgXn0oqnrEzmpF\/s1700-e365\/chain.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglWVTZH6ZI5o1mqkH_UtqjisYIyJ1thdjxBT8x-QsS32B2ibUFlo4And5uZynTOrYBhmqZcQs7zFyziZemjlRKRV_oCR0xL4IK1-ZU9Sy1g9_uv8g1O800e9sQma9FLDOcZrAgK9ZhDQqLHAUIb_fL5fkKXWz32y2l0Z4MM5d0IpJKcBOgXn0oqnrEzmpF\/s1700-e365\/chain.jpg\" alt=\"\" border=\"0\" data-original-height=\"558\" data-original-width=\"1000\"\/><\/a><\/div>\n<p>\u00abThis technique bypasses DNS-based detection systems, DNS sinkholes, and network traffic analysis tools that monitor suspicious domain lookups, ensuring that the malware&#8217;s C2 communications remain stealth by traditional network security infrastructure.\u00bb<\/p>\n<p>Dohdoor has also been found to unhook system calls to bypass endpoint detection and response (EDR) solutions that monitor Windows API calls through <a href=\"https:\/\/www.mdsec.co.uk\/2020\/12\/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams\/\" rel=\"noopener\" target=\"_blank\">user-mode hooks in NTDLL.dll<\/a>.<\/p>\n<p>There is currently no clarity on who is behind UAT-10027, but Cisco Talos said it found some tactical similarities between Dohdoor and Lazarloader, a <a href=\"https:\/\/s2w.inc\/en\/resource\/detail\/941\" rel=\"noopener\" target=\"_blank\">downloader<\/a> previously identified as used by the North Korean hacking group Lazarus in attacks aimed at South Korea.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ztw-hands-on-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhC66R4wPZ8qksTJukqlCCmrHCUX65DnpWW1nKnkOhy0Poe219tacbU6h09qEfUgRHxoObBazf3SVJ4OAd_iVd0EFecj-vskZSfroQ7rh0XyxQd6Ep_zNgqDW95YU4zG1Gpin8rHPK8Rqu_1KV7tf-G-7JJhxOVHhRJDWnj0qfq82uZSAvAG2rxK-Fe5fwd\/s728-e100\/ThreatLocker-d.png\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abWhile UAT-10027&#8217;s malware shares technical overlaps with the Lazarus Group, the campaign\u2019s focus on the education and health care sectors deviates from Lazarus&#8217; typical profile of cryptocurrency and defense targeting,\u00bb Talos concluded.<\/p>\n<p>\u00abHowever, [&#8230;] North Korean APT actors have targeted the healthcare sector using Maui ransomware, and another North Korean APT group, Kimsuky, has targeted the <a href=\"https:\/\/globalcyberalliance.org\/aide-data-kimsuky\/\" rel=\"noopener\" target=\"_blank\">education sector<\/a>, highlighting the overlaps in the victimology of UAT-10027 with that of other North Korean APTs.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Feb 26, 2026Malware \/ Threat Intelligence A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since&hellip;<\/p>\n","protected":false},"author":1,"featured_media":67,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[179,178,177,97,78,96,176],"class_list":["post-66","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-backdoor","tag-dohdoor","tag-education","tag-healthcare","tag-targets","tag-u-s","tag-uat10027"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/66","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/66\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/67"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=66"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}