CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 23, 2026

China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors

The Hacker News Archived Apr 23, 2026 ✓ Full text saved

Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. "The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and execute various backdoors in its arsenal," Slovakian cybersecurity company ESET said in a report shared with The Hacker

Full text archived locally
✦ AI Summary · Claude Sonnet


    China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors Ravie LakshmananApr 23, 2026Threat Intelligence / Malware Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper. "The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and execute various backdoors in its arsenal," Slovakian cybersecurity company ESET said in a report shared with The Hacker News. "GopherWhisper abuses legitimate services, notably Discord, Slack, Microsoft 365 Outlook, and file.io for command-and-control (C&C) communication and exfiltration." The group was first discovered in January 2025 following the discovery of a never-before-seen backdoor codenamed LaxGopher on a system belonging to a Mongolian governmental entity. Also discovered as part of the threat actor's arsenal are a number of other malware families, mostly developed using Golang to receive instructions from the C&C server, execute them, and send the results back. Also used by the threat actor is a file collection tool to gather files of interest and exfiltrate them in compressed format to the file[.]io file sharing service and a C++ backdoor that offers remote control over compromised hosts. Telemetry data from ESET shows that about 12 systems associated with the Mongolian governmental institution were infected by the backdoors, with C&C traffic from the attacker-controlled Discord and Slack servers indicating dozens of other victims. Exactly how GopherWhisper obtains initial access to the target networks is currently not known. But a successful foothold is followed by attempts to deploy a wide range of tools and implants - JabGopher, an injector that executes the LaxGopher ("whisper.dll") backdoor. LaxGopher, a Go-based backdoor that uses Slack for C2 to execute commands via "cmd.exe" and publish the results back to the Slack channel, as well as download additional malware. CompactGopher, a Go-based file collection utility dropped by LaxGopher to filter files of interest by extensions (.doc, .docx, .jpg, .xls, .xlsx, .txt, .pdf, .ppt, and .pptx.), compress them into ZIP files, encrypt the archives using AES-CFB-128, and exfiltrate them to file[.]io. RatGopher, a Go-based backdoor that uses a private Discord server to receive C&C messages, execute commands, and publish the results back to the configured Discord channel, as well as upload and download files from file[.]io. SSLORDoor, a C++-based backdoor that uses OpenSSL BIO for communication via raw sockets on port 443 to enumerate drives, perform file operations, and run commands based on C&C input via "cmd.exe." FriendDelivery, a malicious DLL that serves as a loader and injector for BoxOfFriends. BoxOfFriends, a Go-based backdoor that uses the Microsoft Graph API to craft draft emails for C2 using hard-coded credentials, with the earliest Outlook account created for this purpose ("barrantaya.1010@outlook[.]com") created on July 11, 2024. "Timestamp inspection of the Slack and Discord messages showed us that the bulk of them were being sent during working hours, i.e., between 8 a.m. and 5 p.m., which aligns with China Standard Time," ESET researcher Eric Howard said. "Furthermore, the locale for the configured user in Slack metadata was also set to this time zone. We therefore believe that GopherWhisper is a China-aligned group." Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post. SHARE     Tweet Share Share SHARE  Advanced Persistent Threat, cybersecurity, Discord, Golang, Malware, Microsoft 365, Threat Intelligence Trending News OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams Why Security Leaders Are Layering Email Defense on Top of Secure Email Gateways Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials The Hidden Security Risks of Shadow AI in Enterprises 108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation Why Threat Intelligence Is the Missing Link in CTEM Prioritization and Validation Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched Your MTTD Looks Great. Your Post-Alert Gap Doesn't n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities Load More ▼ Popular Resources How to Identify Risky Browser Extensions in Your Organization Discover Key AI Security Gaps CISOs Face in 2026 Automate Alert Triage and Investigations Across Every Threat Fix Rising Application Security Risks Driven by AI Development
    💬 Team Notes
    Article Info
    Source
    The Hacker News
    Category
    ◇ Industry News & Leadership
    Published
    Apr 23, 2026
    Archived
    Apr 23, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗