@fediverse @rimu @Snoopy @Jerry #piefed is fairly new as a social media platform. There was no piefed instance before COVID if I'm not mistaken.
There ought to be more #instances of #piefed in order to reach newer users. And you might be aware that #piefed would find huge number of users in geographical areas like #china and #southAsia . What are your thoughts on this ??
Moreover, the #fediverse has its own neat rules when it comes to federating servers. Please share your thoughts on this each of you.
WEBINAR 30 APR 12:15 UTC – SAIDGI – Social Media And Digital Sovereignty In South Asia
REGISTER | ADD TO CALENDAR | PERMALINK
On Thursday 30 April 2026, at 12:15 UTC, the South Asia Internet Governance Initiative (SAIDGI) will host a webinar 'Social Media And Digital Sovereignty In South Asia'. In an era defined by rapid technological shifts, SAIDGI is convening this inaugural high-level discussion t
Harvester Expands Linux Arsenal with GoGra Backdoor in South Asia
Harvester's Linux arsenal just got a boost with the deployment of the GoGra backdoor in South Asia, enabling the threat actor to sneak past traditional network defenses by hijacking legitimate Microsoft Graph API and Outlook mailboxes. This latest move is linked to Harvester's earlier espionage campaigns targeting key sectors in the region.
#Harvester #Linux #GograBackdoor #MicrosoftGraphApi #SouthAsia
APT Group Expands Toolset With New GoGra Linux Backdoor
The Harvester APT group has developed a highly-evasive Linux version of its GoGra backdoor that leverages Microsoft Graph API and Outlook mailboxes as a covert command-and-control channel to bypass traditional network defenses. Initial VirusTotal submissions originated from India and Afghanistan, indicating these regions as primary targets. The attackers use social engineering with tailored decoy documents masquerading as legitimate files, including references to Indian food delivery services. The backdoor uses hardcoded Azure AD credentials to poll mailboxes every two seconds, executing commands received via email and exfiltrating results back to operators. Analysis confirms this Linux variant shares nearly identical code with a previously known Windows version, including matching spelling errors, demonstrating the group's multi-platform development strategy and continued expansion of capabilities targeting South Asia for espionage purposes.
Pulse ID: 69e8b27323474e048df8d7b1
Pulse Link: https://otx.alienvault.com/pulse/69e8b27323474e048df8d7b1
Pulse Author: AlienVault
Created: 2026-04-22 11:35:15
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Afghanistan #Asia #Azure #BackDoor #CyberSecurity #Email #Espionage #India #InfoSec #Linux #Microsoft #OTX #OpenThreatExchange #Outlook #RAT #Rust #SocialEngineering #SouthAsia #VirusTotal #Windows #bot #AlienVault