Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Outlook for Linux Backdoor Stealth

Hackers Exploit Outlook for Linux Backdoor Stealth

Posted on April 23, 2026 By CWS

An advanced persistent threat group has devised a method to conceal malicious activities within Microsoft Outlook, complicating detection by standard security systems.

Innovative Espionage Tactics

The hacking collective, Harvester APT, believed to be state-sponsored and active since 2021, has launched a Linux version of its GoGra backdoor. This malware uses Microsoft Graph API and Outlook mailboxes as a hidden command-and-control channel, enabling it to evade traditional network defenses.

Focusing on espionage, this campaign primarily targets South Asia, with initial malware submissions from India and Afghanistan suggesting localized targeting. The use of culturally relevant decoy documents further indicates a strategic approach to espionage.

Cross-Platform Expansion

Security researchers from Symantec and Carbon Black identified this Linux variant as an evolution of Harvester’s previous Windows-focused operations. They noted significant code similarities, indicating that Harvester is expanding its capabilities across different platforms.

The group’s initial access method involved social engineering, using decoy documents that appeared legitimate but harbored malicious Linux ELF binaries. Once executed, these files initiated a stealth infection process, embedding persistence mechanisms to withstand reboots.

Leveraging Microsoft Infrastructure

Technically, the most notable feature of the backdoor is its use of legitimate Microsoft cloud services for covert communication. After infecting a system, a Go dropper delivers an executable payload to initiate and maintain the backdoor’s operations.

The malware uses hardcoded Azure AD credentials to obtain OAuth2 tokens, enabling it to communicate through a designated Outlook mailbox. Commands are sent via emails, decrypted, executed, and the results are securely returned, erasing traces of the interaction.

Security teams are advised to scrutinize unexpected autostart entries and systemd services, particularly those mimicking legitimate software. Organizations should monitor OAuth2 token requests and Microsoft Graph API activity for irregularities. Blocking unknown Azure AD credentials can mitigate such threats.

For further insights and updates, follow our channels on Google News, LinkedIn, and X.

Cyber Security News Tags:Azure AD, cloud services, cyber espionage, Cybersecurity, Harvester APT, Linux backdoor, Malware, Microsoft Graph API, OAuth2 tokens, Outlook exploit, social engineering, South Asia, system security

Post navigation

Previous Post: Trusted Relationships: Emerging Threat in Email Security
Next Post: Fighting Automated Exploits at AI Speed

Related Posts

AccuKnox Awarded Patent for Runtime Security of Kernel Events AccuKnox Awarded Patent for Runtime Security of Kernel Events Cyber Security News
Kali Linux 2025.4 Released With 3 New Hacking Tools and Wifipumpkin3 Kali Linux 2025.4 Released With 3 New Hacking Tools and Wifipumpkin3 Cyber Security News
Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data Cyber Security News
Anthropic Introduces AI-Driven Code Security Analysis Anthropic Introduces AI-Driven Code Security Analysis Cyber Security News
Android Malware Masquerades as RTO Notifications Android Malware Masquerades as RTO Notifications Cyber Security News
React Native Packages Targeted by Credential-Stealing Malware React Native Packages Targeted by Credential-Stealing Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cloudsmith Secures $72M in Series C Funding Boost
  • Bitwarden CLI Breach Highlights Supply Chain Risks
  • Fake Trading Platform Spreads Needle Stealer Malware
  • Rituals Cosmetics Reveals Member Data Breach Incident
  • New Malware Targets MacOS to Steal Cryptocurrency

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cloudsmith Secures $72M in Series C Funding Boost
  • Bitwarden CLI Breach Highlights Supply Chain Risks
  • Fake Trading Platform Spreads Needle Stealer Malware
  • Rituals Cosmetics Reveals Member Data Breach Incident
  • New Malware Targets MacOS to Steal Cryptocurrency

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark