News: 1772222360

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Suspected Nork digital intruders caught breaking into US healthcare, education orgs

(2026/02/27)


Digital intruders with possible links to North Korea have been infecting US education and healthcare sectors with a never-before-seen backdoor since at least December, according to security researchers.

"We observed that the attacker had infected several educational institutions, including a university that is connected to several other institutions, indicating a potential wider attack surface," Cisco Talos researcher Chetan Raghuprasad told The Register . "Additionally, one of the affected entities was a healthcare facility, specifically for elderly care.

"Based on the nature of the victimology in the current intrusions, the actor likely has a motive for financial gain," Raghuprasad added.

[1]

Talos [2]spotted the ongoing campaign , attributed to a group it tracks as UAT-10027, and says "with low confidence" that it's a North Korean crew based on similarities to Lazarus Group and other Pyongyang-backed gangs.

[3]

[4]

The attackers likely gain initial access via social engineering and phishing, we're told, and the multi-stage infection ultimately delivers a new backdoor, Dohdoor, which shares similar technical characteristics to Lazarus Group's [5]Lazarloader malware.

After gaining access - potentially through a phishing email - the intruders execute a PowerShell downloader that runs a Windows batch script dropper from a remote staging server. The batch script then orchestrates a dynamic-link library (DLL) sideloading technique to execute a malicious Windows DLL named "propsys.dll" or "batmeter.dll."

Brand new Dohdoor

The DLL, which Talos calls "Dohdoor," operates as a loader, and it downloads, decrypts, and executes malicious payloads within legitimate Windows processes. This gives the intruders backdoor access to the victim's environment so it can download the next payload - a Cobalt Strike Beacon - into the machine's memory.

UAT-10027 uses several stealthy techniques to help it avoid detection, including setting up command-and-control (C2) domains using Cloudflare infrastructure and using a technique called DNS-over-HTTPS to resolve the C2 server IP address. This helps the attackers bypass DNS security tools by ensuring all outbound traffic from compromised machines looks like legitimate HTTPS traffic to a trusted IP address.

[6]

Dohoor also uses a technique called process hollowing to inject the payload into a legitimate Windows binary, allowing the malware to run without being detected.

Additionally, Talos observed the new backdoor using an endpoint detection and response (EDR) bypass technique to bypass endpoint security tools that monitor Windows API calls. The backdoor does this by by unhooking system calls through user mode hooks in ntdll.dll.

"The NTDLL unhooking technique used to bypass EDR monitoring by identifying and restoring system call stubs aligns with features found in earlier Lazarloader variants," Talos' researchers Alex Karkins and Chetan Raghuprasad said in a Thursday report.

[7]North Korea's Lazarus Group targets healthcare orgs with Medusa ransomware

[8]QR codes a powerful new phishing weapon in hands of Pyongyang cyberspies

[9]Amazon blocked 1,800 suspected North Korean scammers seeking jobs

[10]AI security startup CEO posts a job. Deepfake candidate applies, inner turmoil ensues

They also noted that using DNS-over-HTTPS (DoH) via Cloudflare's DNS service, the process hollowing technique, and sideloading malicious DLLs in disguised file name "propsys.dll," have all been used in earlier Lazarus campaigns.

"While UAT-10027's malware shares technical overlaps with the Lazarus Group, the campaign's focus on the education and health care sectors deviates from Lazarus' typical profile of cryptocurrency and defense targeting," the duo said.

[11]

That assertion may be slightly out of date: Symantec and Carbon Black threat hunters earlier this week warned that [12]Lazarus has begun using Medusa ransomware in extortion attacks targeting at least one US healthcare organization.

One of Lazarus' most prolific subgroups, Andariel, which acts as the cyber-arm of North Korea's military intelligence agency, has previously used [13]Maui and [14]Play ransomware in its intrusions - including those targeting the healthcare sector. Additionally, [15]Kimsuky , another one of Pyongyang's intelligence-gathering goon squads, has hit the [16]education sector in its campaigns. ®

Get our [17]Tech Resources



[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aaIiFSNsr7TxmJmbjnqeYAAAAZI&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[2] https://blog.talosintelligence.com/new-dohdoor-malware-campaign/

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aaIiFSNsr7TxmJmbjnqeYAAAAZI&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aaIiFSNsr7TxmJmbjnqeYAAAAZI&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://s2w.inc/en/resource/detail/941

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aaIiFSNsr7TxmJmbjnqeYAAAAZI&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[7] https://www.theregister.com/2026/02/24/north_koreas_lazarus_group_healthcare_medusa_ransomware/

[8] https://www.theregister.com/2026/01/09/pyongyangs_cyberspies_are_turning_qr/

[9] https://www.theregister.com/2025/12/18/amazon_blocked_fake_dprk_workers/

[10] https://www.theregister.com/2026/02/01/ai_security_startup_ceo_posts/

[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aaIiFSNsr7TxmJmbjnqeYAAAAZI&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[12] https://www.theregister.com/2026/02/24/north_koreas_lazarus_group_healthcare_medusa_ransomware/

[13] https://www.theregister.com/2022/08/10/maui_ransomware_andariel/

[14] https://unit42.paloaltonetworks.com/north-korean-threat-group-play-ransomware/

[15] https://www.theregister.com/2026/01/09/pyongyangs_cyberspies_are_turning_qr/

[16] https://globalcyberalliance.org/aide-data-kimsuky/#:~:text=The%20group%20is%20primarily%20targeting,group%27s%20sophisticated%20global%20reconnaissance%20operations

[17] https://whitepapers.theregister.com/



It's important that people know what you stand for.
It's more important that they know what you won't stand for.