Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Home/Threats/Fake Security Software Delivers LucidRook Malware in
Threats

Fake Security Software Delivers LucidRook Malware in

A newly identified malware, dubbed LucidRook, is actively targeting organizations across Taiwan. Threat actors are deploying this sophisticated malware by concealing it within what appears to be...

Sarah simpson
Sarah simpson
April 9, 2026 3 Min Read
4 0

A newly identified malware, dubbed LucidRook, is actively targeting organizations across Taiwan. Threat actors are deploying this sophisticated malware by concealing it within what appears to be legitimate security software, according to a recent report.

The attackers went out of their way to make it look convincingly real, forging the icon and application name of a well-known cybersecurity product to trick victims into running it.

The campaign focuses on Taiwanese non-governmental organizations and suspected universities. Attackers used spearphishing emails containing shortened URLs that led to password-protected compressed archives.

One of the decoy documents inside the archive was an official letter issued by the Taiwanese government to universities — a lure that added credibility to the attack.

The email and all decoy materials were written in Traditional Chinese, suggesting the campaign was deliberately aimed at a Taiwanese audience.

Cisco Talos researchers uncovered the activity after spotting a cluster of attacks attributed to a threat group tracked as UT.

The group was observed running spearphishing campaigns against Taiwanese NGOs and suspected universities to deliver LucidRook — a malware that stands out for its Lua-based architecture and layered design.

The discovery revealed that LucidRook is a sophisticated stager embedding a Lua interpreter alongside Rust-compiled libraries within a Windows DLL.

What separates this campaign from typical malware distribution is the level of effort put into both deception and engineering. Alongside LucidRook, researchers also identified a companion reconnaissance tool named LucidNight.

Its presence suggests the threat actor operates a tiered toolkit, likely using LucidNight to profile targets before committing to a full malware deployment.

Cisco Talos assesses with medium confidence that this activity reflects a targeted intrusion rather than opportunistic malware spreading.

The infection begins with a spearphishing email guiding the victim to download a password-protected archive. The dropper — dubbed LucidPan — disguises itself as a Trend Micro security product, complete with a forged icon and application name.

It also drops decoy documents, including a government-issued letter sent to Taiwanese universities, to keep the victim distracted while the malicious chain executes silently in the background.

Infection Mechanism and Persistence

Once on the system, LucidPan abuses a legitimate Windows binary associated with the Deployment Image Servicing and Management framework.

LNK-based infection chain (Source - Cisco Talos)
LNK-based infection chain (Source – Cisco Talos)

It exploits DLL search order hijacking, dropping DismCore.dll — the LucidRook stager — into a hidden directory alongside the legitimate executable index.exe. When the victim clicks the disguised LNK file, it triggers index.exe, which then loads the malicious DismCore.dll.

LNK with Substituted Icon in Archive (Source - Cisco Talos)
LNK with Substituted Icon in Archive (Source – Cisco Talos)

Persistence is established through an LNK file placed in the Windows Startup folder, which launches msedge.exe after the binaries are dropped — impersonating Microsoft Edge to blend into normal system activity. The stager is written to %APPDATA%, and DismCore.dll is disguised under that name to avoid raising immediate suspicion.

LNK Target Metadata (Source - Cisco Talos)
LNK Target Metadata (Source – Cisco Talos)

Before reaching out to its command-and-control infrastructure, LucidRook gathers the username, computer name, drive details, running processes, and installed software.

This data is stored in three encrypted files — 1.bin, 2.bin, and 3.bin — packaged into a password-protected archive using RSA keys.

The stager then communicates with compromised FTP servers operated by Taiwanese printing companies whose credentials were publicly listed on their websites, uploading the collected data and retrieving an encrypted Lua bytecode payload.

To further harden itself against analysis, LucidRook applies a non-standard safe mode that disables dynamic library loading and employs a string obfuscation scheme using a parallel lookup table to conceal embedded strings at runtime.

Cisco Talos has published indicators of compromise on its GitHub repository to help defenders identify this threat.

Organizations are advised to apply strict email filtering to catch spearphishing attempts, monitor for unusual DLL sideloading activity and processes launched from %APPDATA%, secure FTP servers to prevent credential exposure, and deploy the Snort detection rules released by Cisco Talos covering LucidRook, LucidPan, and related components.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityExploitMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Hackers Impersonate Linux Leader on Slack to Target Dev

Next Post

STX RAT Evades Detection with Hidden Remote Uses Desktop

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us