Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GopherWhisper Attacks Mongolian Government with Go Malware

GopherWhisper Attacks Mongolian Government with Go Malware

Posted on April 23, 2026 By CWS

A Mongolian government agency has been targeted by a newly identified advanced persistent threat (APT) group known as GopherWhisper, reportedly linked to China. The cyber attackers utilize a suite of tools primarily developed in the Go programming language, employing injectors and loaders to deploy various backdoor applications, according to a report by Slovak cybersecurity firm ESET.

Methods and Tools Employed by GopherWhisper

GopherWhisper exploits legitimate services such as Discord, Slack, Microsoft 365 Outlook, and file.io for command-and-control (C&C) operations and data exfiltration. The group was first detected in January 2025 after the discovery of a new backdoor, named LaxGopher, within a Mongolian government system. This discovery also revealed other malware families, mostly Go-based, designed to receive and execute commands from C&C servers, then return the results.

The threat actor employs a file collection tool to gather and compress files of interest, which are then exfiltrated using the file.io service. Additionally, a C++ backdoor allows remote control over infected hosts. ESET’s telemetry data indicates that around 12 Mongolian government systems have been compromised, with C&C traffic suggesting many more potential victims.

Unraveling GopherWhisper’s Intrusion Tactics

Despite the effectiveness of GopherWhisper’s operations, the initial method used to infiltrate target networks remains unclear. Following a successful infiltration, the attackers deploy multiple tools and implants, such as JabGopher, which executes the LaxGopher backdoor, and CompactGopher, which collects and processes files based on specific extensions.

Other tools in the group’s arsenal include RatGopher, a backdoor that uses a private Discord server for communication, and SSLORDoor, a C++ backdoor leveraging OpenSSL for secure data transactions. FriendDelivery acts as a loader and injector for the BoxOfFriends backdoor, using Microsoft Graph API to manage C2 operations.

Analysis and Implications of the Cyber Attack

The investigation into GopherWhisper’s activities revealed that communications through Slack and Discord predominantly occurred during China’s working hours, suggesting the group’s geographical alignment. Furthermore, the Slack metadata indicated a locale consistent with China Standard Time, supporting the hypothesis of the group’s Chinese affiliation.

This attack underscores the evolving sophistication of cyber threats targeting government entities, emphasizing the need for vigilant cybersecurity measures. As organizations continue to face such advanced threats, understanding the tactics, techniques, and procedures of groups like GopherWhisper becomes crucial.

Looking ahead, cybersecurity experts anticipate that the strategies and technologies employed by APT groups will continue to advance, necessitating ongoing vigilance and adaptation in defensive measures. The implications of GopherWhisper’s activities serve as a stark reminder of the persistent and evolving nature of cyber threats.

The Hacker News Tags:APT group, Backdoor, Cybersecurity, data exfiltration, Discord, ESET report, file.io, Go malware, GopherWhisper, Microsoft 365, Mongolian government, remote access, Slack

Post navigation

Previous Post: Pack2TheRoot Vulnerability Exposes Linux Systems to Threats
Next Post: Apple Fixes iOS Bug Preventing Deleted Chat Recovery

Related Posts

Over 900 FreePBX Systems Infected in Web Shell Attacks Over 900 FreePBX Systems Infected in Web Shell Attacks The Hacker News
Android Malware Poses Threat to Mobile Banking Users Android Malware Poses Threat to Mobile Banking Users The Hacker News
Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials The Hacker News
New ClickFix Variant Exploits Network Drives New ClickFix Variant Exploits Network Drives The Hacker News
VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption The Hacker News
SystemBC Server Uncovers 1,570 Victims in Ransomware Operation SystemBC Server Uncovers 1,570 Victims in Ransomware Operation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rilian Secures $17.5 Million to Enhance AI Security Solutions
  • Fighting Automated Exploits at AI Speed
  • Hackers Exploit Outlook for Linux Backdoor Stealth
  • Trusted Relationships: Emerging Threat in Email Security
  • Apple Resolves iOS Bug Exposing Deleted Signal Alerts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rilian Secures $17.5 Million to Enhance AI Security Solutions
  • Fighting Automated Exploits at AI Speed
  • Hackers Exploit Outlook for Linux Backdoor Stealth
  • Trusted Relationships: Emerging Threat in Email Security
  • Apple Resolves iOS Bug Exposing Deleted Signal Alerts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark