Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Outlook for Linux Backdoor Stealth

Hackers Exploit Outlook for Linux Backdoor Stealth

Posted on April 23, 2026 By CWS

An advanced persistent threat group has devised a method to conceal malicious activities within Microsoft Outlook, complicating detection by standard security systems.

Innovative Espionage Tactics

The hacking collective, Harvester APT, believed to be state-sponsored and active since 2021, has launched a Linux version of its GoGra backdoor. This malware uses Microsoft Graph API and Outlook mailboxes as a hidden command-and-control channel, enabling it to evade traditional network defenses.

Focusing on espionage, this campaign primarily targets South Asia, with initial malware submissions from India and Afghanistan suggesting localized targeting. The use of culturally relevant decoy documents further indicates a strategic approach to espionage.

Cross-Platform Expansion

Security researchers from Symantec and Carbon Black identified this Linux variant as an evolution of Harvester’s previous Windows-focused operations. They noted significant code similarities, indicating that Harvester is expanding its capabilities across different platforms.

The group’s initial access method involved social engineering, using decoy documents that appeared legitimate but harbored malicious Linux ELF binaries. Once executed, these files initiated a stealth infection process, embedding persistence mechanisms to withstand reboots.

Leveraging Microsoft Infrastructure

Technically, the most notable feature of the backdoor is its use of legitimate Microsoft cloud services for covert communication. After infecting a system, a Go dropper delivers an executable payload to initiate and maintain the backdoor’s operations.

The malware uses hardcoded Azure AD credentials to obtain OAuth2 tokens, enabling it to communicate through a designated Outlook mailbox. Commands are sent via emails, decrypted, executed, and the results are securely returned, erasing traces of the interaction.

Security teams are advised to scrutinize unexpected autostart entries and systemd services, particularly those mimicking legitimate software. Organizations should monitor OAuth2 token requests and Microsoft Graph API activity for irregularities. Blocking unknown Azure AD credentials can mitigate such threats.

For further insights and updates, follow our channels on Google News, LinkedIn, and X.

Cyber Security News Tags:Azure AD, cloud services, cyber espionage, Cybersecurity, Harvester APT, Linux backdoor, Malware, Microsoft Graph API, OAuth2 tokens, Outlook exploit, social engineering, South Asia, system security

Post navigation

Previous Post: Trusted Relationships: Emerging Threat in Email Security
Next Post: Fighting Automated Exploits at AI Speed

Related Posts

Netflix Acquires Warner Bros. Studios and HBO in Landmark .7 Billion Megadeal Netflix Acquires Warner Bros. Studios and HBO in Landmark $82.7 Billion Megadeal Cyber Security News
CISA Warns of Android 0-Day Vulnerability Exploited in Attacks CISA Warns of Android 0-Day Vulnerability Exploited in Attacks Cyber Security News
PagerDuty Confirms Data Breach After Third-Party App Vulnerability Exposes Salesforce Data PagerDuty Confirms Data Breach After Third-Party App Vulnerability Exposes Salesforce Data Cyber Security News
Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware Cyber Security News
Threat Actors Weaponizing Visual Studio Code to Deploy a Multistage Malware Threat Actors Weaponizing Visual Studio Code to Deploy a Multistage Malware Cyber Security News
AI API Routers: Security Risks and Data Theft Concerns AI API Routers: Security Risks and Data Theft Concerns Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese Cybersecurity Firm’s AI Claims Rival Top Models
  • AI Model Unveils Software Flaws, Raises Fixing Concerns
  • Vercel Reports Security Breach Through Third-Party Tool
  • Rilian Secures $17.5 Million to Enhance AI Security Solutions
  • Fighting Automated Exploits at AI Speed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chinese Cybersecurity Firm’s AI Claims Rival Top Models
  • AI Model Unveils Software Flaws, Raises Fixing Concerns
  • Vercel Reports Security Breach Through Third-Party Tool
  • Rilian Secures $17.5 Million to Enhance AI Security Solutions
  • Fighting Automated Exploits at AI Speed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark