Malware & RansomwareHIGH

LucidRook Malware - Targeting NGOs and Universities in Taiwan

Featured image for LucidRook Malware - Targeting NGOs and Universities in Taiwan
#LucidRook#UAT-10362#malware#Taiwan#spear-phishing

Original Reporting

BCBleepingComputer·Bill Toulas

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🦠
🦠 MALWARE PROFILE
Malware NameLucidRook
Malware TypeModular Malware
Threat ActorUAT-10362
Target PlatformWindows
Delivery MethodSpear-Phishing Emails
Persistence MechanismMalware Dropper
C2 InfrastructureFTP
CapabilitiesData Exfiltration, System Reconnaissance
IOCs AvailableObfuscated Code, LNK Files
Detection RateLow
MITRE ATT&CKT1566.001
🎯

Basically, LucidRook is a new type of malware that tricks organizations into downloading harmful software.

Quick Summary

LucidRook malware is targeting NGOs and universities in Taiwan through sophisticated spear-phishing campaigns. This new threat poses significant risks to sensitive data. Security experts urge organizations to enhance their defenses against such attacks.

What Happened

A new malware known as LucidRook has emerged, being used in targeted spear-phishing campaigns against non-governmental organizations (NGOs) and universities in Taiwan. Researchers from Cisco Talos attribute this malware to a threat group identified as UAT-10362, described as a skilled adversary with advanced operational techniques.

How It Works

LucidRook is a Lua-based malware that operates through spear-phishing emails containing password-protected archives. The malware was first observed in attacks in October 2025. Two primary infection chains were identified:

  • LNK shortcut file: This method delivers a malware dropper called LucidPawn.
  • EXE-based chain: This approach uses a fake antivirus executable that impersonates Trend Micro Worry-Free Business Security Services.

The LNK-based attack employs decoy documents, such as forged government letters, to distract users and encourage them to open malicious files.

Who's Being Targeted

The primary targets of LucidRook are NGOs and educational institutions in Taiwan. These organizations often handle sensitive data, making them attractive targets for cybercriminals.

Signs of Infection

Indicators of infection include:

  • Unusual emails with attachments, particularly password-protected files.
  • Presence of files named similarly to legitimate software, such as Microsoft Edge.
  • Any unexpected system behavior or performance issues.

How to Protect Yourself

To safeguard against LucidRook and similar malware, consider the following steps:

  • Educate employees about the risks of phishing and suspicious emails.
  • Implement email filtering solutions to catch malicious attachments.
  • Regularly update and patch software to close vulnerabilities that malware could exploit.

Technical Details

LucidRook features a modular design and a built-in Lua execution environment. This allows it to execute second-stage payloads as Lua bytecode, enabling threat actors to update the malware without altering the core code. Additionally, its extensive code obfuscation complicates reverse engineering efforts, making detection and mitigation more challenging.

During execution, LucidRook conducts system reconnaissance, gathering sensitive information such as user and computer names, installed applications, and running processes. This data is encrypted and exfiltrated to attacker-controlled infrastructure via FTP. A related tool named LucidKnight has also been identified, which likely assists in reconnaissance by exfiltrating data using Gmail's GMTP.

Conclusion

Cisco Talos concludes that the LucidRook attacks are part of a targeted intrusion campaign. While they have medium confidence in this attribution, the specific actions taken post-infection remain unclear due to the lack of captured decryptable Lua bytecode. Organizations should remain vigilant and take proactive measures to defend against such sophisticated threats.

🔍 How to Check If You're Affected

  1. 1.Monitor for unusual email attachments, especially password-protected files.
  2. 2.Check for unexpected applications or processes running on systems.
  3. 3.Implement email filtering to block known malicious senders.

🏢 Impacted Sectors

EducationNon-Profit

🗺️ MITRE ATT&CK Techniques

Pro Insight

🔒 Pro insight: LucidRook's use of Lua for modular updates enhances its stealth, complicating detection and response efforts for targeted organizations.

Sources

Original Report

BCBleepingComputer· Bill Toulas
Read Original

Related Pings

HIGHMalware & Ransomware

Cracked Software - 5 Ways to Mitigate Security Risks

Cracked software is a hidden danger in many organizations. Employees often download these versions without realizing the risks. Discover five effective strategies to mitigate these threats.

SC Media·
HIGHMalware & Ransomware

STX RAT - Targets Finance Sector With Stealth Tactics

A new remote access trojan, STX RAT, targets the finance sector using advanced stealth tactics. Its sophisticated delivery methods pose a significant threat to sensitive data. Organizations must enhance their defenses to combat this emerging threat.

Infosecurity Magazine·
HIGHMalware & Ransomware

Phishing Attack - Google Storage Delivers Remcos RAT

A new phishing attack is using Google Cloud Storage to deliver Remcos RAT. This sophisticated campaign targets unsuspecting users globally, exploiting trust in Google. Stay alert to avoid falling victim.

Cyber Security News·
HIGHMalware & Ransomware

RoningLoader - New Malware Campaign Evades Detection Tactics

A new stealthy malware campaign named RoningLoader has emerged, targeting Chinese-speaking users. It cleverly disguises itself as trusted software to evade detection, posing serious risks to security tools. Organizations must remain vigilant against this sophisticated threat.

Cyber Security News·
HIGHMalware & Ransomware

Silver Fox Campaign - ValleyRAT Hidden in Telegram Installer

A new malware campaign by the Silver Fox APT group is delivering ValleyRAT through a fake Telegram installer. This poses serious risks to users who may unknowingly install it. Stay vigilant and only download software from trusted sources.

Cyber Security News·
HIGHMalware & Ransomware

Automated Magic Packet Generation - Enhancing Malware Analysis

A new tool automates the creation of packets that trigger BPF malware, drastically cutting analysis time. This impacts sectors like telecommunications and government. Swift action is needed to combat these stealthy threats.

Cloudflare Blog·