Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Microsoft named a Leader in 2026 Gartner® Magic Quadrant™ for Integration Platform as a Service

    April 23, 2026

    Bluesky now supports better quality photos

    April 23, 2026

    Enhancing Web Design: Recognizing Accessibility Issues Now

    April 23, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors
    IT/ Cybersecurity

    China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

    big tee tech hubBy big tee tech hubApril 23, 2026003 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Ravie LakshmananApr 23, 2026Threat Intelligence / Malware

    China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

    Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper.

    “The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and execute various backdoors in its arsenal,” Slovakian cybersecurity company ESET said in a report shared with The Hacker News. “GopherWhisper abuses legitimate services, notably Discord, Slack, Microsoft 365 Outlook, and file.io for command-and-control (C&C) communication and exfiltration.”

    The group was first discovered in January 2025 following the discovery of a never-before-seen backdoor codenamed LaxGopher on a system belonging to a Mongolian governmental entity. Also discovered as part of the threat actor’s arsenal are a number of other malware families, mostly developed using Golang to receive instructions from the C&C server, execute them, and send the results back.

    Also used by the threat actor is a file collection tool to gather files of interest and exfiltrate them in compressed format to the file[.]io file sharing service and a C++ backdoor that offers remote control over compromised hosts.

    Telemetry data from ESET shows that about 12 systems associated with the Mongolian governmental institution were infected by the backdoors, with C&C traffic from the attacker-controlled Discord and Slack servers indicating dozens of other victims.

    go

    Exactly how GopherWhisper obtains initial access to the target networks is currently not known. But a successful foothold is followed by attempts to deploy a wide range of tools and implants –

    • JabGopher, an injector that executes the LaxGopher (“whisper.dll”) backdoor.
    • LaxGopher, a Go-based backdoor that uses Slack for C2 to execute commands via “cmd.exe” and publish the results back to the Slack channel, as well as download additional malware.
    • CompactGopher, a Go-based file collection utility dropped by LaxGopher to filter files of interest by extensions (.doc, .docx, .jpg, .xls, .xlsx, .txt, .pdf, .ppt, and .pptx.), compress them into ZIP files, encrypt the archives using AES-CFB-128, and exfiltrate them to file[.]io.
    • RatGopher, a Go-based backdoor that uses a private Discord server to receive C&C messages, execute commands, and publish the results back to the configured Discord channel, as well as upload and download files from file[.]io.
    • SSLORDoor, a C++-based backdoor that uses OpenSSL BIO for communication via raw sockets on port 443 to enumerate drives, perform file operations, and run commands based on C&C input via “cmd.exe.”
    • FriendDelivery, a malicious DLL that serves as a loader and injector for BoxOfFriends.
    • BoxOfFriends, a Go-based backdoor that uses the Microsoft Graph API to craft draft emails for C2 using hard-coded credentials, with the earliest Outlook account created for this purpose (“barrantaya.1010@outlook[.]com”) created on July 11, 2024.

    “Timestamp inspection of the Slack and Discord messages showed us that the bulk of them were being sent during working hours, i.e., between 8 a.m. and 5 p.m., which aligns with China Standard Time,” ESET researcher Eric Howard said. “Furthermore, the locale for the configured user in Slack metadata was also set to this time zone. We therefore believe that GopherWhisper is a China-aligned group.”



    Source link

    Backdoors ChinaLinked GopherWhisper government Infects Mongolian Systems
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty – Krebs on Security

    April 22, 2026

    What the ransom note won’t say

    April 22, 2026

    Building the Digital Foundation for a Smarter West Lincoln Memorial Hospital

    April 21, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Microsoft named a Leader in 2026 Gartner® Magic Quadrant™ for Integration Platform as a Service

    April 23, 2026

    Bluesky now supports better quality photos

    April 23, 2026

    Enhancing Web Design: Recognizing Accessibility Issues Now

    April 23, 2026

    Eric Tschetter on Decoupling Observability – Software Engineering Radio

    April 23, 2026
    Timer Code
    15 Second Timer for Articles
    20
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Microsoft named a Leader in 2026 Gartner® Magic Quadrant™ for Integration Platform as a Service

    April 23, 2026

    Bluesky now supports better quality photos

    April 23, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.