GopherWhisper: A burrow full of malware
ESET researchers discovered a previously undocumented China-aligned APT group named GopherWhisper that targeted a governmental entity in Mongolia. The group employs a diverse arsenal of custom tools, predominantly written in Go, including backdoors LaxGopher, RatGopher, and BoxOfFriends, along with injectors JabGopher, exfiltration tool CompactGopher, loader FriendDelivery, and C++ backdoor SSLORDoor. The threat actors abuse legitimate services including Discord, Slack, Microsoft 365 Outlook, and file.io for command and control communications and data exfiltration. Through extraction of thousands of messages from compromised Slack and Discord channels, researchers gained valuable insights into the group's internal operations and post-compromise activities. Timestamp analysis of communications indicates operators work during UTC+8 business hours, aligning with China Standard Time, supporting attribution to China-aligned actors.
Pulse ID: 69ea2ebe8c3499b065ec22a7
Pulse Link: https://otx.alienvault.com/pulse/69ea2ebe8c3499b065ec22a7
Pulse Author: AlienVault
Created: 2026-04-23 14:37:50
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #China #CyberSecurity #Discord #ESET #Government #InfoSec #LUA #Malware #Microsoft #OTX #OpenThreatExchange #Outlook #RAT #SSL #bot #AlienVault