China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks
Security WeekArchived Apr 26, 2026✓ Full text saved
Dubbed GopherWhisper, the group relies on multiple Go-based backdoors alongside custom loaders and injectors. The post China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
A newly uncovered APT is relying on legitimate services for command-and-control (C&C) communication and data exfiltration, ESET warns.
Tracked as GopherWhisper (PDF) and active since at least November 2023, the hacking group is operating out of China, as timestamp inspection of chat messages and emails has revealed.
The APT came to the spotlight in January 2025, during the investigation into a Go-based backdoor found on the systems of a governmental entity in Mongolia, which led to the identification of several other backdoors, custom loaders, and injectors associated with the group.
Dubbed LaxGopher, the backdoor uses Slack for C&C communication and can execute commands via command prompt, exfiltrate victim data, and fetch and execute additional payloads on the infected machines. GopherWhisper, ESET says, mainly used LaxGopher to enumerate drives and files.
An injector named JabGopher is used to execute the backdoor in the memory of a newly spawned instance of svchost.exe.
One of the tools that LaxGopher can deploy is CompactGopher, a file collector written in Go that can compress files from the command line and send them to the file.io file-sharing service using a public REST API.
Another tool in GopherWhisper’s arsenal is RatGopher, a Go-based backdoor. Unlike LaxGopher, it uses Discord for C&C communication. It can open new instances of the command prompt and upload or download files from file.io.
The APT also relies on a C++ backdoor called SSLORDoor, which uses OpenSSL BIO for communication via raw TCP sockets. The malware can spawn a hidden command prompt process, enumerate drives, execute commands related to file manipulation, and create new socket connections.
ESET’s investigation uncovered two additional tools that GopherWhisper deployed against the same Mongolian government organization, namely the BoxOfFriends Go backdoor that relies on the Microsoft Graph API for communication via draft Outlook messages, and the FriendDelivery DLL injector that loads it.
The BoxOfFriends backdoor can exfiltrate files, manipulate ports, and execute supplied commands through a shell opened on the host.
The China-linked APT infected roughly 12 systems within the victim Mongolian governmental institution. According to ESET, dozens of other victims were likely targeted as well.
“Due to the lack of similarities in code, TTPs, and targeting to any existing APT group, we have created GopherWhisper as a new group and attribute the described toolset to it,” ESET notes.
Related: US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor
Related: Trump Administration Vows Crackdown on Chinese Companies ‘Exploiting’ AI Models Made in US
Related: Chinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude Mythos
Related: New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention
WRITTEN BY
Ionut Arghire
Ionut Arghire is an international correspondent for SecurityWeek.
More from Ionut Arghire
Cloudsmith Raises $72 Million in Series C Funding
Rilian Raises $17.5 Million for AI-Native Security Orchestration
Luxury Cosmetics Giant Rituals Discloses Data Breach
Apple Patches iOS Flaw Allowing Recovery of Deleted Chats
Recent Microsoft Defender Vulnerability Exploited as Zero-Day
New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention
Mirai Botnet Targets Flaw in Discontinued D-Link Routers
North Korean Hackers Use AppleScript, ClickFix in Fresh macOS Attacks
Latest News
Pre-Stuxnet Sabotage Malware ‘Fast16’ Linked to US-Iran Cyber Tensions
In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device
Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents
Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World’s Biggest Exercise
US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor
Trump Administration Vows Crackdown on Chinese Companies ‘Exploiting’ AI Models Made in US
Vulnerabilities Patched in CrowdStrike, Tenable Products
Bitwarden NPM Package Hit in Supply Chain Attack
Trending
Webinar: A Step-By-Step Approach To AI Governance
April 28, 2026
With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.
Register
Virtual Event: Threat Detection And Incident Response Summit
May 20, 2026
Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.
Register
People on the Move
Neill Feather has been named Chief Executive Officer at Point Wild.
Oasis Security has appointed Michael DeCesare as President.
Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.
More People On The Move
Expert Insights
Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents
From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George)
Government Can’t Win The Cyber War Without The Private Sector
Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin)
The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security
Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb)
The New Rules Of Engagement: Matching Agentic Attack Speed
The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael)
The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust
Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin)
Flipboard
Reddit
Whatsapp
Email