February 26, 2026 Source: The Hacker News 3 min read · 620 words

UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

UAT-10027 атакує освітні та медичні установи США за допомогою бекдора Dohdoor

A New Backdoor Is Quietly Hunting U.S. Schools and Hospitals

Cisco Talos just uncovered an active malware campaign that's been systematically targeting American education and healthcare institutions for nearly three months. The attackers are deploying a never-before-seen backdoor called Dohdoor that uses a particularly clever trick to phone home—DNS-over-HTTPS—making detection significantly harder.

The Breach

According to The Hacker News, the campaign tracked as UAT-10027 has been running wild since December 2025, and frankly, that's a concerning amount of time for something this sophisticated to operate under the radar. The education sector and healthcare organizations are the targets, which means patient records, student data, and institutional infrastructure are all potentially at risk.

Education cyber attacks have been ramping up for years, but this one's different. Dohdoor isn't some commodity malware you grab off a forum.

It's custom-built. Purposeful. The attackers clearly put thought into this.

Schools and hospitals aren't exactly swimming in cybersecurity budgets either, which makes them appetizing targets. These are institutions that often run legacy systems, patch slowly, and operate with skeleton IT teams juggling a thousand priorities. So why does this matter to your local school district? Because education vulnerability has become a national security issue.

Under the Hood

Here's what makes Dohdoor particularly nasty. Most backdoors use standard protocols—HTTP, HTTPS, maybe some obscure port nobody thinks to monitor. Dohdoor? It s DNS-over-HTTPS for command and control. Think about that for a second.

DNS-over-HTTPS is encrypted. It's increasingly common. It's also nearly impossible to distinguish from legitimate traffic without deep packet inspection.

An attacker hiding commands inside DNS queries wrapped in HTTPS encryption is essentially blending into the noise of normal network operations. Network defenders see thousands of DNS requests daily. Hiding malicious C&C traffic in that stream is like smuggling contraband through an airport during peak holiday travel—it works because everyone's too overwhelmed to look closely.

Cisco Talos hasn't publicly disclosed whether the campaign exploits specific vulnerabilities like react2shell vulnerability targets or if it relies on credential theft and social engineering. The fact that it's undocumented suggests these attackers have invested significantly in keeping their tooling private and effective.

The Fallout

Cyber attack symptoms in compromised education and healthcare environments can range from subtle to catastrophic. You might see unusual outbound traffic spikes. Degraded system performance. Unexplained administrative account activity. But here's the thing—by the time you notice symptoms, the backdoor's already established.

For hospitals, a persistent backdoor means ransomware could arrive tomorrow. Patient data could vanish tonight. Department of education cyber attack scenarios keep security officials up at night, and for good reason—education cyber security gaps directly endanger students and staff.

The implications ripple outward. Healthcare networks handle protected health information. Schools store Social Security numbers, financial aid data, health records. If Dohdoor's operators maintain access, they're sitting on a goldmine of identifiable information.

And the timing? During the school year. During peak hospital operations. Peak chaos.

Protecting Yourself

If you're in education or healthcare, treat this seriously. Start with DNS monitoring—your current defenses probably aren't inspecting DNS-over-HTTPS traffic closely enough, and that's a problem you need to fix. Deploy network detection and response tools that can actually see what's happening inside encrypted traffic.

Patch everything. Seriously. Not next month. Now. Education cyber security jobs exist partly because organizations treat patching like an optional chore—stop doing that.

Implement network segmentation so a backdoor in one system doesn't compromise everything. Require multifactor authentication everywhere. Monitor for unusual administrative activity with actual alerting, not just logging you'll never review.

Disruptive innovation in education examples usually focus on pedagogy, but you know what's disruptive? Having your entire institution encrypted by ransomware. Prevention beats innovation every single time.

Higher education cyber attacks have become common enough that universities should have incident response plans already written, tested, and practiced. If you don't, that's your immediate priority. Waiting for the next campaign won't help.

Read original article →

// FAQ

What is Dohdoor and how does it work?

Dohdoor is a previously undocumented backdoor malware discovered by Cisco Talos that uses DNS-over-HTTPS for command and control, allowing attackers to hide malicious traffic within encrypted DNS queries that blend into normal network operations.

How long has the UAT-10027 campaign been active?

The UAT-10027 campaign has been targeting U.S. education and healthcare sectors since December 2025, making it active for approximately three months as of February 2026.

What should my school or hospital do if we're targeted?

Implement DNS monitoring for encrypted traffic, patch all systems immediately, enforce multifactor authentication, segment your network, and ensure you have an incident response plan tested and ready for activation.

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →