Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China’s GopherWhisper APT Exploits Legitimate Services

China’s GopherWhisper APT Exploits Legitimate Services

Posted on April 25, 2026 By CWS

Emergence of GopherWhisper APT

A sophisticated cyber espionage group known as GopherWhisper has been identified by cybersecurity firm ESET. This advanced persistent threat (APT) group, suspected to be operating from China, leverages legitimate services for its command-and-control (C&C) activities, enabling data exfiltration without raising immediate suspicion. The group’s activities have been traced back to at least November 2023.

Investigation and Discovery

The presence of GopherWhisper was first detected in January 2025 during a probe into a Go-based backdoor found within a Mongolian government system. This investigation led to the discovery of multiple backdoors, custom loaders, and injectors linked to the group. The primary backdoor, named LaxGopher, utilizes Slack for C&C communications, allowing it to execute commands, extract data, and deploy additional payloads on compromised systems.

Furthermore, the group employs an injector called JabGopher, which facilitates the execution of these backdoors within the memory of a svchost.exe process. This technique ensures the persistence of their operations while evading conventional security defenses.

Advanced Tools and Techniques

GopherWhisper’s toolkit includes various sophisticated tools. CompactGopher, a file collector written in Go, compresses files and transmits them through file.io’s public REST API. Another tool, RatGopher, differs from LaxGopher by using Discord for C&C communications, enabling it to open command prompts and manage file transfers.

Additionally, the group utilizes SSLORDoor, a C++ backdoor that communicates via raw TCP sockets using OpenSSL BIO. This malware can conduct a range of operations, including hidden command prompt processes and file manipulation.

Implications and Future Outlook

The investigation by ESET also revealed the deployment of the BoxOfFriends backdoor, which uses the Microsoft Graph API for draft message communications in Outlook, and the FriendDelivery DLL injector. These tools were specifically used against a Mongolian governmental entity, infecting approximately 12 systems, with further potential victims likely.

Due to distinct characteristics and lack of similarities with existing APT groups, ESET has categorized GopherWhisper as a new entity, attributing this unique toolset to them. The identification of this APT underscores the evolving nature of cyber threats originating from state-linked actors, emphasizing the need for robust cybersecurity measures.

As geopolitical tensions influence cyber activities, monitoring advancements in cyber threats like GopherWhisper remains crucial for global cybersecurity resilience.

Security Week News Tags:APT, Backdoor, China, cyber attack, Cybersecurity, data exfiltration, ESET, GopherWhisper, Hacking, Mongolia

Post navigation

Previous Post: Early Cyber Weapon ‘fast16’ Revealed by Researchers
Next Post: OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety

Related Posts

T-Mobile Clarifies Impact of Recent Data Breach T-Mobile Clarifies Impact of Recent Data Breach Security Week News
1.2 Million Impacted by WestJet Data Breach 1.2 Million Impacted by WestJet Data Breach Security Week News
In Other News: CrowdStrike Vulnerabilities, CISA Layoffs, Mango Data Breach In Other News: CrowdStrike Vulnerabilities, CISA Layoffs, Mango Data Breach Security Week News
Google API Keys in Android Apps Risk Data Breach Google API Keys in Android Apps Risk Data Breach Security Week News
Data Breach Affects 1 Million Members at Europe’s Top Gym Data Breach Affects 1 Million Members at Europe’s Top Gym Security Week News
Critical Wing FTP Server Vulnerability Exploited Critical Wing FTP Server Vulnerability Exploited Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety
  • China’s GopherWhisper APT Exploits Legitimate Services
  • Early Cyber Weapon ‘fast16’ Revealed by Researchers
  • Microsoft Fixes Vulnerability in Entra Agent ID Administration
  • CISA Highlights New Security Flaws, Sets 2026 Deadline

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety
  • China’s GopherWhisper APT Exploits Legitimate Services
  • Early Cyber Weapon ‘fast16’ Revealed by Researchers
  • Microsoft Fixes Vulnerability in Entra Agent ID Administration
  • CISA Highlights New Security Flaws, Sets 2026 Deadline

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark