Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Linux GoGra Backdoor Targets South Asia via Microsoft API

Linux GoGra Backdoor Targets South Asia via Microsoft API

Posted on April 22, 2026 By CWS

The cyber threat group known as Harvester has been linked to a new Linux variant of its GoGra backdoor, reportedly aimed at South Asian entities. Utilizing the legitimate Microsoft Graph API, this malware circumvents traditional network defenses by using Outlook mailboxes as its covert command-and-control channel, according to a report shared by Symantec and Carbon Black Threat Hunter Team.

Targeted Regions and Tactics

Evidence of the malware was found on the VirusTotal platform, with uploads identified from India and Afghanistan, pointing to potential targets of this espionage operation. Harvester’s activities were first documented by Symantec in late 2021, revealing a campaign against telecommunications, government, and IT sectors in South Asia. The campaign employed a custom implant named Graphon, which also leveraged the Microsoft Graph API for command-and-control purposes.

Evolution of Harvester’s Toolset

In August 2024, Harvester’s activities were linked to an attack on a media organization in South Asia, deploying a novel Go-based backdoor known as GoGra. The recent discovery indicates Harvester’s expansion into infecting Linux systems with a new version of the backdoor, alongside its Windows counterpart. The attack strategy involves social engineering techniques that persuade targets to execute ELF binaries masquerading as PDF files, which then deploy the backdoor while displaying a decoy document.

Operational Mechanics and Cover-up

Similar to its Windows variant, the Linux GoGra backdoor exploits Microsoft’s cloud infrastructure, querying a designated Outlook mailbox folder named “Zomato Pizza” every two seconds via OData. It scans for emails with subject lines starting with “Input,” decrypts the Base64-encoded content, and executes the commands using “/bin/bash.” Once executed, results are emailed back with “Output” as the subject line. Post-exfiltration, the malware erases the original tasking message to eliminate traces.

Despite employing diverse operating systems and deployment methods, the core command-and-control logic of the GoGra backdoor remains consistent. Symantec and Carbon Black noted identical hard-coded spelling errors across both platforms, suggesting a single developer is responsible for both versions.

The introduction of a Linux backdoor underscores Harvester’s strategic efforts to broaden its attack arsenal, targeting a wider array of systems and victims. As cybersecurity landscapes evolve, vigilance and adaptive defense mechanisms remain crucial.

The Hacker News Tags:Backdoor, Carbon Black, cyber espionage, Cybersecurity, GoGra, Harvester, Linux, Malware, Microsoft Graph API, South Asia, Symantec, VirusTotal

Post navigation

Previous Post: Mastodon Faces Major DDoS Attack Following Bluesky Incident
Next Post: Rise in Supply Chain Attacks Highlights SBOM Challenges

Related Posts

From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools The Hacker News
OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws The Hacker News
ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections The Hacker News
Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS The Hacker News
Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released The Hacker News
GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN GitHub Vulnerability in Codespaces Exposes GITHUB_TOKEN The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Claude Mythos AI Uncovers Numerous Firefox Vulnerabilities
  • Rise in Supply Chain Attacks Highlights SBOM Challenges
  • Linux GoGra Backdoor Targets South Asia via Microsoft API
  • Mastodon Faces Major DDoS Attack Following Bluesky Incident
  • Venezuelan Energy Sector Hit by New Wiper Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Claude Mythos AI Uncovers Numerous Firefox Vulnerabilities
  • Rise in Supply Chain Attacks Highlights SBOM Challenges
  • Linux GoGra Backdoor Targets South Asia via Microsoft API
  • Mastodon Faces Major DDoS Attack Following Bluesky Incident
  • Venezuelan Energy Sector Hit by New Wiper Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark