APT Group Expands Toolset With New GoGra Linux Backdoor
The Harvester APT group has developed a highly-evasive Linux version of its GoGra backdoor that leverages Microsoft Graph API and Outlook mailboxes as a covert command-and-control channel to bypass traditional network defenses. Initial VirusTotal submissions originated from India and Afghanistan, indicating these regions as primary targets. The attackers use social engineering with tailored decoy documents masquerading as legitimate files, including references to Indian food delivery services. The backdoor uses hardcoded Azure AD credentials to poll mailboxes every two seconds, executing commands received via email and exfiltrating results back to operators. Analysis confirms this Linux variant shares nearly identical code with a previously known Windows version, including matching spelling errors, demonstrating the group's multi-platform development strategy and continued expansion of capabilities targeting South Asia for espionage purposes.
Pulse ID: 69e8b27323474e048df8d7b1
Pulse Link: https://otx.alienvault.com/pulse/69e8b27323474e048df8d7b1
Pulse Author: AlienVault
Created: 2026-04-22 11:35:15
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Afghanistan #Asia #Azure #BackDoor #CyberSecurity #Email #Espionage #India #InfoSec #Linux #Microsoft #OTX #OpenThreatExchange #Outlook #RAT #Rust #SocialEngineering #SouthAsia #VirusTotal #Windows #bot #AlienVault









