Suspected Nork digital intruders caught breaking into US healthcare, education orgs

Suspected Nork digital intruders caught breaking into US healthcare, education orgs

Summary

Security researchers at Cisco Talos have uncovered an active campaign, tracked as UAT-10027, delivering a new backdoor called Dohdoor to US education institutions and at least one elderly-care healthcare facility. The multi-stage intrusion begins with phishing and a PowerShell downloader, uses a batch-script dropper to sideload a malicious DLL (“propsys.dll” or “batmeter.dll”), and ultimately runs in-memory payloads such as a Cobalt Strike Beacon. Talos judges the activity to have low-confidence ties to North Korea-linked groups due to technical overlaps with Lazarus/Lazarloader techniques.

Key Points

  • Campaign (UAT-10027) active since at least December, hitting US education and healthcare targets.
  • New loader/backdoor “Dohdoor” is delivered via PowerShell downloader → batch dropper → DLL sideloading.
  • Attackers use Cloudflare-hosted C2 and DNS-over-HTTPS to hide command-and-control traffic as legitimate HTTPS.
  • Dohdoor uses process hollowing and in-memory execution to run Cobalt Strike without writing payloads to disk.
  • The backdoor employs ntdll.dll unhooking to bypass EDR monitoring — a technique seen in previous Lazarus-related campaigns.
  • Talos assigns low-confidence attribution to North Korean actors; victimology suggests financial motive.

Content summary

Cisco Talos describes a sophisticated, multi-stage intrusion chain that culminates in a stealthy loader (Dohdoor) enabling in-memory execution of follow-on tooling. Key evasion methods include DLL sideloading, process hollowing, DNS-over-HTTPS for C2 resolution, and restoring/unhooking ntdll system-call stubs to bypass endpoint detection. While some tactics mirror known North Korea-linked operations, the current targeting of education and healthcare is not a perfect match for Lazarus’ historic focus.

Context and relevance

This is important because education and healthcare organisations frequently have weaker defences yet hold sensitive data and critical services; an intrusion can quickly escalate to data theft, extortion or service disruption. The use of DoH via Cloudflare and EDR-unhooking indicates attackers are adapting to modern defences. Organisations should prioritise anti-phishing measures, restrict DLL sideloading, monitor DoH usage and hunt for in-memory Cobalt Strike indicators.

Why should I read this

Short and blunt: if you look after security for a school, uni or care provider, this is worth five minutes. It shows how crooks are slipping past DNS and endpoint protections with tricks that look like normal HTTPS — and what you should check first.

Source

Source: https://go.theregister.com/feed/www.theregister.com/2026/02/27/suspected_nork_digital_intruders_caught/