Threat IntelHIGH

UAT-10027 Targets U.S. Education and Healthcare with New Backdoor

THThe Hacker News20h ago2 min read
UAT-10027DohdoorCisco Taloseducationhealthcare
🎯

Basically, a new cyberattack is hitting schools and hospitals in the U.S.

Quick Summary

A new cyber campaign named UAT-10027 is targeting U.S. education and healthcare sectors. This attack uses a backdoor called Dohdoor, putting sensitive data at risk. Immediate action is needed to protect these critical services.

What Happened

A new cyber threat is here, and it’s targeting something we all rely on: education and healthcare. Cisco Talos has identified a malicious campaign? known as UAT-10027 that has been active since December 2025. This campaign is not just any run-of-the-mill attack; it aims to deliver a sophisticated backdoor? called Dohdoor.

Dohdoor is unique because it uses a technology called DNS-over-HTTPS (DoH). This means it can hide its activities by blending in with regular web traffic, making it harder to detect. The attackers are focused on infiltrating systems in schools and hospitals, potentially compromising sensitive data? and operations.

Why Should You Care

You might think this doesn't affect you, but if you or your family rely on schools or healthcare services, it absolutely does. Imagine your child's school being disrupted or your doctor unable to access your medical records. This attack could lead to serious consequences for your education and health systems.

In today’s world, where everything is connected, a breach in these sectors can ripple out, affecting your personal information and safety. Think of it like a chain reaction: when one link breaks, it can impact everyone connected to it.

What's Being Done

Cisco Talos is actively monitoring? this threat and working on ways to mitigate the risks. If you are part of an educational institution or healthcare organization, here are some immediate actions to take:

  • Update your security protocols to defend against potential breaches.
  • Educate staff on recognizing phishing attempts and suspicious activities.
  • Monitor network traffic for unusual patterns that could indicate a breach.

Experts are keeping a close eye on UAT-10027, watching for how it evolves and what new tactics it may employ in the future. Stay alert, because the landscape of cyber threats is constantly changing.

💡 Tap dotted terms for explanations

🔒 Pro insight: The use of DNS-over-HTTPS in Dohdoor signifies a shift towards stealthier, more sophisticated cyberattack methodologies.

Original article from

The Hacker News

Read Full Article

Related Pings

MEDIUMThreat Intel

AI Risks: Cyber Defenders Share Their Insights

Trend Micro's latest survey reveals how cybersecurity experts view AI risks. As technology evolves, so do the strategies to protect your data. Understanding these insights can help you feel more secure in your online activities.

Trend Micro Research·28m ago·2m
HIGHThreat Intel

Critical OT Attacks Loom as State Hackers Shift Tactics

State-affiliated hackers are shifting focus to disrupt industrial systems, posing a serious risk to essential services. With fewer than 10% of OT networks able to detect these threats, the potential for chaos is high. Experts urge immediate action to enhance monitoring and patch vulnerabilities.

CSO Online·28m ago·3m
HIGHThreat Intel

Telemetry Flaws: The Single-Source Detection Dilemma

Many organizations are missing critical threats by relying on a single source of telemetry data. This oversight can leave your systems vulnerable. It's time to diversify your data sources and strengthen your security posture.

TrustedSec Blog·28m ago·2m
MEDIUMThreat Intel

Autonomous Threat Operations: Simplifying Threat Hunting to 5 Steps

Recorded Future has revolutionized threat hunting by cutting the process from 27 steps to just 5. This change impacts organizations looking to enhance their cybersecurity. Faster detection means better protection for your data and privacy. Experts are monitoring the rollout closely.

Recorded Future Blog·28m ago·2m
MEDIUMThreat Intel

Cyber Risk Management: Executive Buy-In is Crucial

The 2025 Trend Micro Defenders Survey Report reveals the need for executive support in managing cyber risks. This gap can leave your personal data vulnerable. Organizations are encouraged to engage executives in cybersecurity discussions and allocate necessary resources.

Trend Micro Research·28m ago·2m
HIGHThreat Intel

Iranian Cyber Threat Actor Strikes Iraqi Government with AI Tactics

An Iranian cyber threat actor is targeting Iraq’s Ministry of Foreign Affairs. This attack could compromise sensitive data and impact national security. Experts recommend stronger security measures to protect against such threats.

Infosecurity Magazine·29m ago·2m