UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内。首先,我需要仔细阅读文章,理解其主要内容。 文章讲的是一个未被记录的威胁活动集群,名为UAT-10027,由Cisco Talos追踪。目标是美国的教育和医疗部门,时间至少从2025年12月开始。攻击的目的是投放一个名为Dohdoor的新后门。 Dohdoor使用DNS-over-HTTPS技术进行C2通信,并能下载和执行其他有效负载。初始访问向量未知,但怀疑是钓鱼攻击,导致PowerShell脚本执行。然后下载恶意DLL,利用DLL侧加载技术运行。 C2服务器隐藏在Cloudflare后面,避开传统检测。Dohdoor还能绕过EDR解决方案。作者身份不明,但与 Lazarus集团有技术相似之处,但攻击目标不同。 总结时需要涵盖:威胁集群名称、目标行业、时间、攻击目的、技术手段、C2隐藏方法、绕过检测以及可能的作者关联。 控制在100字以内的话,可能需要简化一些细节。例如: Cisco Talos发现UAT-10027集群针对美国教育和医疗行业发起攻击,投放Dohdoor后门。该后门利用DoH技术通信,并隐藏C2服务器以规避检测。初步怀疑为钓鱼攻击引发的DLL侧加载恶意活动。 这样大概控制在100字左右。 </think> Cisco Talos发现UAT-10027集群针对美国教育和医疗行业发起攻击,投放Dohdoor后门。该后门利用DoH技术通信,并隐藏C2服务器以规避检测。初步怀疑为钓鱼攻击引发的DLL侧加载恶意活动。 2026-2-26 15:17:0 Author: thehackernews.com(查看原文) 阅读量:9 收藏

Malware / Threat Intelligence

A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025.

The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor.

"Dohdoor utilizes the DNS-over-HTTPS (DoH) technique for command-and-control (C2) communications and has the ability to download and execute other payload binaries reflectively," security researchers Alex Karkins and Chetan Raghuprasad said in a technical report shared with The Hacker News.

Although the initial access vector used in the campaign is currently not known, it's suspected to involve the use of social engineering phishing techniques, leading to the execution of a PowerShell script.

The script then proceeds to download and run a Windows batch script from a remote staging server, which, for its part, facilitates the download of a malicious Windows dynamic-link library (DLL) that's named "propsys.dll" or "batmeter.dll."

The DLL payload – i.e., Dohdoor – is launched by means of a legitimate Windows executable (e.g., "Fondue.exe," "mblctr.exe," and "ScreenClippingHost.exe") using a technique referred to as DLL side-loading. The backdoored access created by the implant is used to retrieve a next-stage payload directly into the victim's memory and execute it. The payload is assessed to be a Cobalt Strike Beacon.

"The threat actor hides the C2 servers behind the Cloudflare infrastructure, ensuring that all outbound communication from the victim machine appears as legitimate HTTPS traffic to a trusted global IP address," Talos said. 

"This technique bypasses DNS-based detection systems, DNS sinkholes, and network traffic analysis tools that monitor suspicious domain lookups, ensuring that the malware's C2 communications remain stealth by traditional network security infrastructure."

Dohdoor has also been found to unhook system calls to bypass endpoint detection and response (EDR) solutions that monitor Windows API calls through user-mode hooks in NTDLL.dll.

There is currently no clarity on who is behind UAT-10027, but Cisco Talos said it found some tactical similarities between Dohdoor and Lazarloader, a downloader previously identified as used by the North Korean hacking group Lazarus in attacks aimed at South Korea.

"While UAT-10027's malware shares technical overlaps with the Lazarus Group, the campaign’s focus on the education and health care sectors deviates from Lazarus' typical profile of cryptocurrency and defense targeting," Talos concluded.

"However, [...] North Korean APT actors have targeted the healthcare sector using Maui ransomware, and another North Korean APT group, Kimsuky, has targeted the education sector, highlighting the overlaps in the victimology of UAT-10027 with that of other North Korean APTs."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/uat-10027-targets-us-education-and.html
如有侵权请联系:admin#unsafe.sh