HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Lua‑Based ‘LucidRook’ Malware Targets NGOs and Universities in Taiwan

Cisco Talos uncovered a new Lua‑enabled malware family, LucidRook, used in spear‑phishing attacks against NGOs and universities in Taiwan. The modular design, encrypted exfiltration, and use of password‑protected archives raise significant third‑party risk for education and non‑profit sectors.

🛡️ LiveThreat™ Intelligence · 📅 April 10, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
bleepingcomputer.com

Lua‑Based ‘LucidRook’ Malware Targets NGOs and Universities in Taiwan

What Happened – A new Lua‑enabled malware family named LucidRook was observed in spear‑phishing campaigns against non‑governmental organizations and higher‑education institutions in Taiwan. The attacks use password‑protected archives and either a malicious LNK shortcut or a fake Trend Micro antivirus executable to drop a loader (LucidPawn) that sideloads the main payload.

Why It Matters for TPRM

  • Threat actors can exfiltrate sensitive research, donor, or student data via encrypted FTP uploads.
  • The modular Lua architecture allows rapid updates, making signature‑based defenses less effective.
  • NGOs and universities often rely on third‑party SaaS platforms; compromised credentials could cascade to partner ecosystems.

Who Is Affected – Education & research institutions, non‑profit NGOs, and any third‑party service providers that host or process their data.

Recommended Actions

  • Review phishing‑resilience controls for all vendors handling NGO/university data.
  • Verify that email gateways block password‑protected archives and inspect LNK files.
  • Ensure endpoint detection platforms can detect Lua‑based loaders and encrypted outbound FTP traffic.

Technical Notes

  • Attack vector: Spear‑phishing with password‑protected ZIP/RAR archives; delivery via LNK shortcut or fake antivirus EXE.
  • Malware chain: LNK → LucidPawn (loader) → renamed Edge executable + malicious DismCore.dll → LucidRook (Lua stage).
  • Data exfiltration: RSA‑encrypted payloads stored in password‑protected archives, exfiltrated via FTP; secondary tool “LucidKnight” abuses Gmail GMTP.
  • Obfuscation: Heavy string and identifier encryption, dynamic C2 address resolution.

Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.