By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
Computing

UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

News Room
Last updated: 2026/02/26 at 11:31 AM
News Room Published 26 February 2026
Share
UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
SHARE

Ravie LakshmananFeb 26, 2026Malware / Threat Intelligence

A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025.

The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor.

“Dohdoor utilizes the DNS-over-HTTPS (DoH) technique for command-and-control (C2) communications and has the ability to download and execute other payload binaries reflectively,” security researchers Alex Karkins and Chetan Raghuprasad said in a technical report shared with The Hacker News.

Although the initial access vector used in the campaign is currently not known, it’s suspected to involve the use of social engineering phishing techniques, leading to the execution of a PowerShell script.

The script then proceeds to download and run a Windows batch script from a remote staging server, which, for its part, facilitates the download of a malicious Windows dynamic-link library (DLL) that’s named “propsys.dll” or “batmeter.dll.”

The DLL payload – i.e., Dohdoor – is launched by means of a legitimate Windows executable (e.g., “Fondue.exe,” “mblctr.exe,” and “ScreenClippingHost.exe”) using a technique referred to as DLL side-loading. The backdoored access created by the implant is used to retrieve a next-stage payload directly into the victim’s memory and execute it. The payload is assessed to be a Cobalt Strike Beacon.

“The threat actor hides the C2 servers behind the Cloudflare infrastructure, ensuring that all outbound communication from the victim machine appears as legitimate HTTPS traffic to a trusted global IP address,” Talos said. 

“This technique bypasses DNS-based detection systems, DNS sinkholes, and network traffic analysis tools that monitor suspicious domain lookups, ensuring that the malware’s C2 communications remain stealth by traditional network security infrastructure.”

Dohdoor has also been found to unhook system calls to bypass endpoint detection and response (EDR) solutions that monitor Windows API calls through user-mode hooks in NTDLL.dll.

There is currently no clarity on who is behind UAT-10027, but Cisco Talos said it found some tactical similarities between Dohdoor and Lazarloader, a downloader previously identified as used by the North Korean hacking group Lazarus in attacks aimed at South Korea.

“While UAT-10027’s malware shares technical overlaps with the Lazarus Group, the campaign’s focus on the education and health care sectors deviates from Lazarus’ typical profile of cryptocurrency and defense targeting,” Talos concluded.

“However, […] North Korean APT actors have targeted the healthcare sector using Maui ransomware, and another North Korean APT group, Kimsuky, has targeted the education sector, highlighting the overlaps in the victimology of UAT-10027 with that of other North Korean APTs.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article How to get the Samsung Galaxy S26 Ultra for free at T-Mobile — no trade-in required How to get the Samsung Galaxy S26 Ultra for free at T-Mobile — no trade-in required
Next Article Weird Xbox Notifications on Your Phone? It Was a Mistake and Your Account Is Safe Weird Xbox Notifications on Your Phone? It Was a Mistake and Your Account Is Safe
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

paralyzed, he plays World of Warcraft in his mind
paralyzed, he plays World of Warcraft in his mind
Mobile
Boost Your Backyard Wi-Fi With These Expert Tips
Boost Your Backyard Wi-Fi With These Expert Tips
Gadget
The Complete Guide to Claude’s 2026 Model Lineup: Opus 4.6, Sonnet 4.6, and Haiku 4.5 Compared – Chat GPT AI Hub
The Complete Guide to Claude’s 2026 Model Lineup: Opus 4.6, Sonnet 4.6, and Haiku 4.5 Compared – Chat GPT AI Hub
Computing
Leading through complexity: How Trinity Life Sciences CEO Scott Evangelista is redefining strategy in the age of AI
News

You Might also Like

The Complete Guide to Claude’s 2026 Model Lineup: Opus 4.6, Sonnet 4.6, and Haiku 4.5 Compared – Chat GPT AI Hub
Computing

The Complete Guide to Claude’s 2026 Model Lineup: Opus 4.6, Sonnet 4.6, and Haiku 4.5 Compared – Chat GPT AI Hub

20 Min Read
The TechBeat: How Solution Architects Can Use Generative AI Without Losing Architectural Judgement (4/4/2026) | HackerNoon
Computing

The TechBeat: How Solution Architects Can Use Generative AI Without Losing Architectural Judgement (4/4/2026) | HackerNoon

7 Min Read
Dongfeng’s Premium EV Brand Voyah Files for Hong Kong IPO · TechNode
Computing

Dongfeng’s Premium EV Brand Voyah Files for Hong Kong IPO · TechNode

1 Min Read
How to Get More Instagram Followers in 2025 (25 Proven Tips)
Computing

How to Get More Instagram Followers in 2025 (25 Proven Tips)

21 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?