Emerging Lua-based malware “LucidRook” spotted in coordinated assaults on Taiwanese entities

Apr 8, 2026 | Threat Intelligence Research

Targeted Spear-Phishing Campaign Targets Taiwanese NGOs and Universities

Cisco Talos has recently identified a targeted spear-phishing campaign labeled UAT-10362, which aims at Taiwanese non-governmental organizations and certain universities. This operation delivers a sophisticated malware family known as “LucidRook,” utilizing advanced techniques for infection and evasion.

The malware functions as a stager that integrates a Lua interpreter alongside Rust-compiled libraries within a dynamic-link library (DLL). The deployment process involves the dropper, dubbed “LucidPawn,” which incorporates anti-analysis measures and activates only in environments set to Traditional Chinese, thereby limiting its execution context to Taiwan. Talos has documented two distinct infection chains using malicious LNK and EXE files camouflaged as antivirus software. Both pathways utilize compromised FTP servers and an out-of-band application security testing (OAST) service for their command-and-control operations.

The “LucidRook” malware is particularly notable for its use of embedded Lua code and a strategy that allows flexibility in developing and modifying payloads while improving stealth against detection. As detailed in their analysis, it downloads and executes Lua bytecode from its C2 infrastructure, handling sensitive victim reconnaissance and the exfiltration of system information through encrypted channels. The findings also revealed “LucidKnight,” a reconnaissance tool working alongside “LucidRook,” which collects system details and exfiltrates data via Gmail.

Defensive Context

This activity highlights a real-time risk to organizations within Taiwan that operate in sensitive sectors such as education and non-profit work. The usage of localized content in phishing emails, including legitimate-looking decoy documents relevant to Taiwanese officials, compounds the potential for successful execution against targeted entities.

Organizations within this purview have a heightened exposure level due to their demographic alignment with the threat actor’s operational focus. In contrast, organizations outside this geographic or contextual relevance are less likely to fall victim to this specific campaign. The reliance on traditional methods of deception, such as impersonating trusted software, emphasizes the importance of user education regarding phishing attempts.

Why This Matters

The targeted nature of this campaign indicates a reasonable level of sophistication and planning by adversaries, suggesting a shift in attacker behavior towards focusing specific efforts on geopolitical weaknesses. The flexibility and adaptive design of the malware further imply a potentially evolving threat landscape wherein attackers can dynamically tailor their approaches based on the operational context.

Defender Considerations

Defenders working within organizations in Taiwan should remain vigilant against suspicious emails, particularly those leveraging geopolitical context. Monitoring for known behaviors, such as the execution of the “LucidPawn” or “LucidRook” dropper and its mechanisms for invoking PowerShell and embedding malware within legitimate processes, can be critical for early detection.

Indicators of Compromise (IOCs)

  • Domains: 1.34.253[.]131, 59.124.71[.]242
  • Malware samples:
    • LucidPawn: 6aba7b5a9b4f7ad4203f26f3fb539911369aeef502d43af23aa3646d91280ad9
    • LucidRook Dropper: 11ae897d79548b6b44da75f7ab335a0585f47886ce22b371f6d340968dbed9ae
  • Email addresses: [email protected], [email protected]

The reported findings serve as a critical warning for defenders to bolster their reconnaissance and detection capabilities, particularly given the localized focus of the campaign.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles