Skip to main content

Archived Article — The Daily Perspective is no longer active. This article was published on 1 March 2026 and is preserved as part of the archive. Read the farewell | Browse archive

Technology

North Korea's Cyber Arm Sets Sights on Hospitals and Universities

A newly discovered backdoor with Lazarus Group fingerprints is quietly infiltrating US healthcare and education systems, with clear lessons for Australian institutions.

North Korea's Cyber Arm Sets Sights on Hospitals and Universities
Image: The Register
Key Points 4 min read
  • Cisco Talos discovered a previously unknown backdoor called Dohdoor targeting US education and healthcare organisations since at least December 2025.
  • The threat cluster, tracked as UAT-10027, shares technical traits with North Korea's Lazarus Group, though attribution remains low-confidence.
  • Dohdoor uses DNS-over-HTTPS and Cloudflare infrastructure to disguise malicious traffic as legitimate web activity, defeating standard network monitoring.
  • The campaign follows separate Lazarus Group attacks using Medusa ransomware against US and Middle Eastern healthcare organisations in recent weeks.
  • Australian healthcare and university sectors face the same structural vulnerabilities: high-value data, constrained security budgets, and ageing infrastructure.

From Singapore: A newly identified piece of malware is quietly burrowing through American hospitals and universities, and the technical fingerprints left behind are pointing, tentatively, toward Pyongyang. The discovery raises uncomfortable questions not just for US institutions but for their counterparts across the Indo-Pacific, including Australia, where the same structural weaknesses that made these targets attractive are present in abundance.

Cisco Talos published findings last week detailing an ongoing intrusion campaign, active since at least December 2025, that has delivered a previously undocumented backdoor it calls Dohdoor. The campaign is tracked under the moniker UAT-10027, and the targets have been victims in the education and healthcare sectors in the United States. The reporting outlet was The Register, which spoke directly with Talos researcher Chetan Raghuprasad.

Raghuprasad told The Register that the attacker had infected several educational institutions, including a university connected to several other institutions, indicating a potential wider attack surface, and that one of the affected entities was a healthcare facility specifically for elderly care. He added that, based on the nature of the victimology, the actor likely has a motive for financial gain. That framing, financially motivated intrusions against data-rich but security-constrained institutions, is one that cybersecurity professionals in Australia will recognise immediately.

A Backdoor Built to Disappear

The attackers likely gain initial access via social engineering and phishing. After gaining entry, the intruders execute a PowerShell downloader that runs a Windows batch script dropper from a remote staging server. The batch script then orchestrates a dynamic-link library sideloading technique to execute a malicious Windows DLL named "propsys.dll" or "batmeter.dll".

That DLL, which Talos calls Dohdoor, operates as a loader, downloading, decrypting, and executing malicious payloads within legitimate Windows processes. The end goal, according to Talos, is to deploy a Cobalt Strike Beacon directly into system memory, giving the attackers persistent, covert access. What makes Dohdoor particularly difficult to detect is the layered evasion it employs at every stage.

"The threat actor hides the C2 servers behind the Cloudflare infrastructure, ensuring that all outbound communication from the victim machine appears as legitimate HTTPS traffic to a trusted global IP address," Talos said. Dohdoor has also been found to unhook system calls to bypass endpoint detection and response solutions that monitor Windows API calls through user-mode hooks in NTDLL.dll. In practical terms, the malware is designed to look, to most enterprise security tools, like ordinary web traffic and ordinary Windows activity.

Illustration representing North Korean cyber operations
North Korean state-linked hacking groups have steadily expanded their targeting to include healthcare and education sectors. (Stock illustration)

Lazarus Fingerprints, With Caveats

Talos assesses with low confidence that UAT-10027 links to North Korea due to overlaps with the Lazarus Group. The specific similarities are technical rather than circumstantial. Dohdoor shares traits with Lazarloader, including a custom XOR-SUB routine using the 0x26 constant and NTDLL unhooking for EDR evasion. The campaign also uses DNS-over-HTTPS via Cloudflare, DLL sideloading, process hollowing, and mixed-case top-level domains — tradecraft seen in earlier Lazarus operations.

The "low confidence" attribution is worth taking seriously. Talos itself acknowledged that while UAT-10027's malware shares technical overlaps with the Lazarus Group, the campaign's focus on the education and healthcare sectors deviates from Lazarus' typical profile of cryptocurrency and defence targeting. Responsible cyber attribution is genuinely difficult, and conflating distinct threat actors can lead defenders to misallocate resources or misread threat signals.

That said, the broader pattern is becoming harder to dismiss. Separately, Symantec and Carbon Black researchers reported this week that the North Korea-linked Lazarus Group has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, with Broadcom's threat intelligence division also identifying the same threat actors mounting an unsuccessful attack against a healthcare organisation in the US. North Korean advanced persistent threat actors have targeted the healthcare sector using Maui ransomware, and another North Korean group, Kimsuky, has targeted the education sector, highlighting the overlaps in victimology with UAT-10027.

Why Hospitals and Universities Are in the Crosshairs

These sectors often hold large volumes of personally identifiable information, medical records, and financial data, while operating under tight budgets and constrained security teams, which makes them attractive targets for sophisticated, persistence-oriented intrusions. The calculus is straightforward: high data value, lower defensive capability, and an institutional reluctance to tolerate operational downtime that makes ransom payment more likely.

For Australian institutions, the structural parallel is direct. The Australian Cyber Security Centre has consistently flagged healthcare and higher education as sectors of elevated risk. Australian universities hold extensive research data, including defence-adjacent research, that is of clear intelligence interest to state-linked actors. Public hospital networks, many running legacy systems across state jurisdictions, present exactly the kind of fragmented attack surface that campaigns like Dohdoor are engineered to exploit.

North Korean flag representing state-linked cyber threat actors
State-linked North Korean cyber operations are assessed to fund espionage and weapons programmes through financially motivated hacking. (Stock image)

The Funding Loop Behind the Attacks

There is a strategic logic to Pyongyang's expanding cyber footprint that goes beyond opportunistic theft. Prosecutors in an earlier US indictment alleged that one Lazarus subgroup was using proceeds of ransomware attacks to fund espionage activities, including attacks against the defence, technology, and government sectors in the US, Taiwan, and South Korea. The criminal activity and the intelligence activity are not separate programmes; they are the same programme, with hospitals and universities subsidising the espionage campaigns that follow.

Critics of current cybersecurity policy frameworks would argue, with justification, that the international community's response to North Korean cyber operations has been inadequate. UN Security Council sanctions have done little to deter the Democratic People's Republic of Korea's hacking apparatus, and indictments of named individuals, while symbolically significant, carry no enforcement mechanism when the accused never leave Pyongyang. The structural incentive for Pyongyang to continue, and expand, these operations remains intact.

What Defenders Should Do Now

The technical remediation guidance from Talos is specific. Defenders should monitor and, where possible, inspect DNS-over-HTTPS traffic, block or restrict suspicious living-off-the-land binary executions, and deploy endpoint detection and response-driven detection for process-hollowing and syscall-unhooking, applying the latest Dohdoor-specific signatures and rules published by Cisco Talos.

The broader policy challenge is harder to resolve. Institutions most at risk of attacks like this, underfunded public hospitals and regional universities, are precisely the organisations least equipped to implement sophisticated threat-hunting programmes. Mandating higher baseline security standards is a defensible regulatory position, but it carries real costs that must ultimately be borne by someone, whether patients, students, or taxpayers. Dismissing that trade-off as secondary to security imperatives is easier when you are not running a rural health service on a state government budget.

The evidence, accumulating steadily across multiple research teams, points toward a concerted and expanding North Korean effort to extract revenue from institutions that serve ordinary people. Reasonable people can debate the right policy mix of sanctions, offensive cyber operations, and domestic regulation to address it. What is no longer reasonable is treating attacks on healthcare and education as peripheral to the cybersecurity conversation. The Australian Signals Directorate and its counterparts in the region would do well to treat the Dohdoor campaign as a direct warning, not merely a distant American problem.

Sources (1)
Mitchell Tan
Mitchell Tan

Mitchell Tan is an AI editorial persona created by The Daily Perspective. Covering the economic powerhouses of the Indo-Pacific with a focus on what Asian business developments mean for Australian companies and exporters. As an AI persona, articles are generated using artificial intelligence with editorial quality controls.