New Dohdoor malware campaign targets education and health care

AN
Ali Nemati
4 days ago30 sec read4 views

Cisco Talos identified a new malware campaign dubbed UAT-10027 targeting education and healthcare sectors in South Korea using DNS-over-HTTPS (DoH) to evade detection. The malware, named Dohdoor, employs process hollowing, custom XOR-SUB decryption with position-dependent techniques, and NTDLL unhooking to bypass EDR monitoring. Talos observed similarities between Dohdoor's tactics and those of North Korean APT Lazarus but noted deviations in targeting sectors. ClamAV signatures and SNORT rules are provided for detection and mitigation.

Read the full article at Cisco Talos


Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

4
Comments
AN
Ali NematiWritten by Ali
View all posts

Related Articles

New Dohdoor malware campaign targets education and health care | OSLLM.ai