BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /New Campaign Targets Healthcare & Education While Blockchain C2 Evolves Evasion

New Campaign Targets Healthcare & Education While Blockchain C2 Evolves Evasion

February 27, 2026Vulnerabilities & Exploits3 min readhigh

Originally reported by The Hacker News, Ars Technica Security, Microsoft Security, SANS ISC, MSRC Security Updates

#threat-actors#backdoor#blockchain-c2#healthcare#education#gaming-malware#wifi-attacks#regex-dos
Share

TL;DR

A new threat cluster UAT-10027 is actively targeting US healthcare and education sectors with the Dohdoor backdoor, while the Aeternum C2 botnet demonstrates blockchain-based command infrastructure for improved resilience. Additional threats include gaming-focused RATs and a new Wi-Fi encryption bypass attack.

Why high?

Multiple active threat campaigns targeting critical infrastructure sectors (healthcare, education) with novel backdoors and evasion techniques warrant high severity classification.

Active Campaign Targets Critical US Sectors

UAT-10027 Deploys Dohdoor Backdoor Against Healthcare and Education

Cisco Talos has identified a previously undocumented threat activity cluster, designated UAT-10027, conducting an ongoing campaign against US education and healthcare sectors since December 2025. The campaign deploys a novel backdoor called Dohdoor that utilizes DNS-over-HTTPS (DoH) for command and control communications, demonstrating the threat actor's focus on stealth and persistence in critical infrastructure environments.

Blockchain-Based C2 Infrastructure Emerges

Qrator Labs researchers have documented the Aeternum C2 botnet, which represents a significant evolution in command-and-control architecture. Rather than relying on traditional server infrastructure, Aeternum stores encrypted commands on the Polygon blockchain, making takedown efforts substantially more complex. This approach signals a potential shift toward decentralized C2 mechanisms that leverage legitimate blockchain networks for malicious purposes.

Gaming and Social Media Threat Vectors

Java-Based RATs Target Gaming Communities

Microsoft Threat Intelligence has observed threat actors distributing trojanized gaming utilities through browsers and chat platforms. The attack chain involves a malicious downloader that stages a portable Java runtime environment and executes a malicious JAR file named jd-gui.jar using PowerShell. This campaign highlights the continued targeting of gaming communities as an attack vector for RAT deployment.

Meta Pursues Legal Action Against Scam Networks

Meta has filed lawsuits against deceptive advertisers operating from Brazil, China, and Vietnam who conduct celebrity-bait scams on its platforms. The company has suspended payment methods, disabled associated accounts, and blocked domain names used in these operations, demonstrating platform-level efforts to combat coordinated inauthentic behavior.

Network Infrastructure Vulnerabilities

AirSnitch Attack Bypasses Wi-Fi Encryption

Researchers have disclosed the AirSnitch attack methodology, which can bypass Wi-Fi encryption in home, office, and enterprise environments. The attack particularly affects guest network configurations that users may assume provide adequate security isolation.

Critical Vulnerability Disclosures

Several notable CVEs have been published:

  • CVE-2026-27571: NATS server WebSocket vulnerability enabling pre-authentication memory DoS attacks
  • CVE-2026-27965: Vitess privilege escalation allowing backup storage users to access production environments
  • CVE-2025-69873: AJV (Another JSON Schema Validator) ReDoS vulnerability when $data option is enabled, allowing catastrophic backtracking attacks
  • CVE-2026-3063: Chromium DevTools implementation vulnerability affecting Microsoft Edge

AI Security and Threat Modeling

Microsoft Security has published guidance on threat modeling AI applications, addressing misuse scenarios, emergent risks, and failure modes in probabilistic and agentic AI systems. This guidance reflects the growing need for specialized security frameworks as AI integration accelerates across enterprise environments.

Sources

  • Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
  • Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams
  • Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown
  • UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
  • New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
  • Threat modeling AI applications
  • CVE-2026-27571
  • CVE-2026-27965
  • CVE-2025-69873
  • CVE-2026-3063

Originally reported by The Hacker News, Ars Technica Security, Microsoft Security, SANS ISC, MSRC Security Updates

Tags

#threat-actors#backdoor#blockchain-c2#healthcare#education#gaming-malware#wifi-attacks#regex-dos

Tracked Companies

🇺🇸Meta Platforms

Related Intelligence

  • APT28 Macro Campaign, AI Model Theft, and Central Asian Telecom Attacks

    highFeb 24, 2026
  • Chrome Privilege Escalation Patched, SD-WAN Zero-Days, and UK Cyber Essentials Evolution

    highMar 2, 2026
  • Weekly Vulnerability Roundup: OpenClaw AI Agent Hijacking, Vim Command Injection, and Vitess Path Traversal

    highMar 1, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Privacy Surveillance Roundup: Iran's Digital Apartheid, Job Scam Malware, and $21B Identity Theft Costs

Next Article

Nation-State Roundup: China-Linked Espionage Campaign Hits 42 Countries, CISA Adds Critical Cisco Flaws to KEV →