Connect with us

Security

Stealthy Strikes: LucidRook Malware Threatens NGOs and Universities

Published

on

New ‘LucidRook’ Malware Targeting NGOs and Universities

A recently discovered Lua-based malware known as LucidRook is currently being utilized in spear-phishing campaigns aimed at non-governmental organizations and universities in Taiwan.

According to researchers at Cisco Talos, the malware has been attributed to a threat group identified internally as UAT-10362, described as a proficient adversary with well-developed operational techniques.

LucidRook was first detected in attacks in October 2025, which involved phishing emails containing password-protected archives.

Two distinct infection chains were identified by the researchers. One chain utilized an LNK shortcut file that ultimately delivered the LucidPawn malware dropper, while the other chain was EXE-based and involved a fake antivirus executable posing as Trend Micro Worry-Free Business Security Services.

The LNK-based attack method involved using decoy documents, such as government letters made to appear as if they were from the Taiwanese government, to distract the user.

LNK-based attack chain
LNK-based attack chain
Source: Cisco Talos

Cisco Talos observed that LucidPawn decrypts and deploys a legitimate executable renamed to mimic Microsoft Edge, alongside a malicious DLL (DismCore.dll) for sideloading LucidRook.

One notable feature of LucidRook is its modular design and built-in Lua execution environment, allowing it to retrieve and execute second-stage payloads as Lua bytecode.

This unique approach enables operators to update functionality without altering the core malware, while also reducing forensic visibility. The extensive obfuscation of the code further enhances its stealth.

Cisco Talos elaborates, stating, “Embedding the Lua interpreter effectively transforms the native DLL into a stable execution platform while enabling the threat actor to customize behavior for each target or campaign by updating the Lua bytecode payload with a lighter and more flexible development process.”

See also  OpenClaw Security Suite: Protecting Your Data from Malware Threats

The researchers also noted that the binary is heavily obfuscated across embedded strings, file extensions, internal identifiers, and C2 addresses, complicating reverse-engineering efforts.

During its operation, LucidRook conducts system reconnaissance, gathering information such as user and computer names, installed applications, and running processes.

The collected data is encrypted using RSA, stored in password-protected archives, and then sent to attacker-controlled infrastructure via FTP.

While analyzing LucidRook, Talos researchers discovered a related tool named “LucidKnight,” likely used for reconnaissance purposes.

One intriguing aspect of LucidKnight is its exploitation of Gmail GMTP for data exfiltration, indicating that UAT-10362 maintains a versatile toolkit to meet various operational requirements.

Cisco Talos concludes with medium confidence that the LucidRook attacks form part of a targeted intrusion campaign. However, they were unable to access a decryptable Lua bytecode fetched by LucidRook, thus the specific post-infection actions remain unknown.

tines

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

Trending