Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
GopherWhisper Attacks Mongolian Government with Go Malware

GopherWhisper Attacks Mongolian Government with Go Malware

Posted on April 23, 2026 By CWS

A Mongolian government agency has been targeted by a newly identified advanced persistent threat (APT) group known as GopherWhisper, reportedly linked to China. The cyber attackers utilize a suite of tools primarily developed in the Go programming language, employing injectors and loaders to deploy various backdoor applications, according to a report by Slovak cybersecurity firm ESET.

Methods and Tools Employed by GopherWhisper

GopherWhisper exploits legitimate services such as Discord, Slack, Microsoft 365 Outlook, and file.io for command-and-control (C&C) operations and data exfiltration. The group was first detected in January 2025 after the discovery of a new backdoor, named LaxGopher, within a Mongolian government system. This discovery also revealed other malware families, mostly Go-based, designed to receive and execute commands from C&C servers, then return the results.

The threat actor employs a file collection tool to gather and compress files of interest, which are then exfiltrated using the file.io service. Additionally, a C++ backdoor allows remote control over infected hosts. ESET’s telemetry data indicates that around 12 Mongolian government systems have been compromised, with C&C traffic suggesting many more potential victims.

Unraveling GopherWhisper’s Intrusion Tactics

Despite the effectiveness of GopherWhisper’s operations, the initial method used to infiltrate target networks remains unclear. Following a successful infiltration, the attackers deploy multiple tools and implants, such as JabGopher, which executes the LaxGopher backdoor, and CompactGopher, which collects and processes files based on specific extensions.

Other tools in the group’s arsenal include RatGopher, a backdoor that uses a private Discord server for communication, and SSLORDoor, a C++ backdoor leveraging OpenSSL for secure data transactions. FriendDelivery acts as a loader and injector for the BoxOfFriends backdoor, using Microsoft Graph API to manage C2 operations.

Analysis and Implications of the Cyber Attack

The investigation into GopherWhisper’s activities revealed that communications through Slack and Discord predominantly occurred during China’s working hours, suggesting the group’s geographical alignment. Furthermore, the Slack metadata indicated a locale consistent with China Standard Time, supporting the hypothesis of the group’s Chinese affiliation.

This attack underscores the evolving sophistication of cyber threats targeting government entities, emphasizing the need for vigilant cybersecurity measures. As organizations continue to face such advanced threats, understanding the tactics, techniques, and procedures of groups like GopherWhisper becomes crucial.

Looking ahead, cybersecurity experts anticipate that the strategies and technologies employed by APT groups will continue to advance, necessitating ongoing vigilance and adaptation in defensive measures. The implications of GopherWhisper’s activities serve as a stark reminder of the persistent and evolving nature of cyber threats.

The Hacker News Tags:APT group, Backdoor, Cybersecurity, data exfiltration, Discord, ESET report, file.io, Go malware, GopherWhisper, Microsoft 365, Mongolian government, remote access, Slack

Post navigation

Previous Post: Pack2TheRoot Vulnerability Exposes Linux Systems to Threats
Next Post: Apple Fixes iOS Bug Preventing Deleted Chat Recovery

Related Posts

CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence The Hacker News
Helping CISOs Speak the Language of Business Helping CISOs Speak the Language of Business The Hacker News
Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes The Hacker News
New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT The Hacker News
GPT-5 Agent That Finds and Fixes Code Flaws Automatically GPT-5 Agent That Finds and Fixes Code Flaws Automatically The Hacker News
Reynolds Ransomware Uses Vulnerable Driver to Bypass Security Reynolds Ransomware Uses Vulnerable Driver to Bypass Security The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Systems Autonomously Breach Cloud Security with Minimal Oversight
  • Vercel Uncovers Additional Breach Linked to Context.ai
  • Apple Fixes iOS Bug Preventing Deleted Chat Recovery
  • GopherWhisper Attacks Mongolian Government with Go Malware
  • Pack2TheRoot Vulnerability Exposes Linux Systems to Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Systems Autonomously Breach Cloud Security with Minimal Oversight
  • Vercel Uncovers Additional Breach Linked to Context.ai
  • Apple Fixes iOS Bug Preventing Deleted Chat Recovery
  • GopherWhisper Attacks Mongolian Government with Go Malware
  • Pack2TheRoot Vulnerability Exposes Linux Systems to Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark