Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,理解主要信息。 文章讲的是一个叫做Harvester的威胁行为者,他们开发了一个新的Linux版本的GoGra后门程序。这个后门利用微软的Graph API和Outlook邮箱作为命令控制通道,能够绕过传统的网络防御。Symantec和Carbon Black团队发现,恶意软件可能针对南亚国家,比如印度和阿富汗。 接下来,我需要提取关键点:Harvester、Linux版GoGra、利用微软API、针对南亚、传统防御绕过。然后把这些信息浓缩成简洁的句子,确保不超过100字。 还要注意用户的要求是直接写描述,不需要开头语。所以我会直接列出主要信息,保持连贯和清晰。 最后检查一下字数是否符合要求,并确保没有遗漏重要细节。 </think> Harvester组织利用新的Linux版GoGra后门攻击南亚地区目标。该恶意软件通过微软Graph API和Outlook邮箱作为C2通道绕过传统网络防御。攻击针对印度和阿富汗等国,利用社会工程手段诱使受害者执行伪装成PDF的ELF二进制文件。后门通过"Zomato Pizza"邮箱文件夹接收指令并执行命令,结果通过邮件返回。此活动显示Harvester持续扩展工具集以攻击更多目标。 2026-4-22 15:28:0 Author: thehackernews.com(查看原文) 阅读量:11 收藏

Cyber Espionage / Malware

The threat actor known as Harvester has been attributed to a new Linux version of its GoGra backdoor deployed as part of attacks likely targeting entities in South Asia.

"The malware uses the legitimate Microsoft Graph API and Outlook mailboxes as a covert command-and-control (C2) channel, allowing it to bypass traditional perimeter network defenses," the Symantec and Carbon Black Threat Hunter Team said in a report shared with The Hacker News.

The cybersecurity company said it identified artifacts uploaded to the VirusTotal platform from India and Afghanistan, suggesting that the two countries may be the target of the espionage activity.

Harvester was first publicly documented by Symantec in late 2021, linking it to an information-stealing campaign aimed at telecommunications, government, and information technology sectors in South Asia since June 2021, using a bespoke implant called Graphon that used the Microsoft Graph API for C2.

Subsequent activity flagged in August 2024 connected the hacking group to an attack targeting an unnamed media organization in South Asia with a never-before-seen Go-based backdoor called GoGra. The latest findings suggest that the adversary is continuing to expand its toolset beyond Windows and infecting Linux machines with a new variant of the same backdoor.

The attacks employ social engineering to trick victims into opening ELF binaries disguised as PDF documents. The dropper then proceeds to display a lure document while stealthily running the backdoor.

Like its Windows counterpart, the Linux version of GoGra abuses Microsoft's cloud infrastructure to contact a specific Outlook mailbox folder named "Zomato Pizza" every two seconds using Open Data Protocol (OData) queries. The backdoor scans the inbox for incoming email messages with a subject line starting with the word "Input."

Once an email matching the criteria is received, it decrypts the Base64-encoded message body and executes it as shell commands using "/bin/bash." The results of the execution are sent back to the operator in an email message with the subject line "Output." After the exfiltration step is complete, the implant wipes the original tasking message to cover up the tracks.

"Despite using different deployment architectures and operating systems, the underlying C2 logic remains unchanged," Symantec and Carbon Black said, adding the teams "also identified several matching, hard-coded spelling errors across both platforms, which points towards the same developer being behind both tools."

"The use of a new Linux backdoor shows that Harvester is continuing to expand its toolset and actively develop new tooling in order to go after a wider range of victims and machines."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/harvester-deploys-linux-gogra-backdoor.html
如有侵权请联系:admin#unsafe.sh