China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在一百个字以内。不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述即可。首先,我需要仔细阅读文章,抓住主要信息。 文章讲的是蒙古政府机构被一个之前未记录的中国相关APT组织GopherWhisper攻击。这个组织使用了多种Go语言编写的工具,包括注入器、加载器和后门程序。他们滥用Discord、Slack、Microsoft 365 Outlook和file.io来进行命令控制和数据外泄。最早是在2025年1月发现的LaxGopher后门,还有其他几个恶意软件家族。ESET的数据显示大约有12个系统被感染,C&C通信来自Discord和Slack服务器,还涉及多个受害者。 接下来,我需要把这些信息浓缩到100字以内。要包含关键点:目标是蒙古政府机构,APT组织GopherWhisper,使用Go语言工具,滥用合法服务进行攻击和数据外泄,以及发现的时间和影响范围。 可能的结构是:蒙古政府机构遭受中国相关APT组织GopherWhisper攻击,该组织利用Go语言工具和合法服务进行恶意活动,已感染多个系统。 检查字数是否在限制内,并确保信息准确无误。最后确定总结是否符合用户的要求。 </think> 蒙古政府机构遭中国关联APT组织GopherWhisper攻击,该组织利用Go语言工具及Discord、Slack等合法服务进行恶意活动,已感染多个系统。 2026-4-23 09:4:0 Author: thehackernews.com(查看原文) 阅读量:21 收藏

Threat Intelligence / Malware

Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT) group tracked as GopherWhisper.

"The group wields a wide array of tools mostly written in Go, using injectors and loaders to deploy and execute various backdoors in its arsenal," Slovakian cybersecurity company ESET said in a report shared with The Hacker News. "GopherWhisper abuses legitimate services, notably Discord, Slack, Microsoft 365 Outlook, and file.io for command-and-control (C&C) communication and exfiltration."

The group was first discovered in January 2025 following the discovery of a never-before-seen backdoor codenamed LaxGopher on a system belonging to a Mongolian governmental entity. Also discovered as part of the threat actor's arsenal are a number of other malware families, mostly developed using Golang to receive instructions from the C&C server, execute them, and send the results back.

Also used by the threat actor is a file collection tool to gather files of interest and exfiltrate them in compressed format to the file[.]io file sharing service and a C++ backdoor that offers remote control over compromised hosts.

Telemetry data from ESET shows that about 12 systems associated with the Mongolian governmental institution were infected by the backdoors, with C&C traffic from the attacker-controlled Discord and Slack servers indicating dozens of other victims.

Exactly how GopherWhisper obtains initial access to the target networks is currently not known. But a successful foothold is followed by attempts to deploy a wide range of tools and implants -

  • JabGopher, an injector that executes the LaxGopher ("whisper.dll") backdoor.
  • LaxGopher, a Go-based backdoor that uses Slack for C2 to execute commands via "cmd.exe" and publish the results back to the Slack channel, as well as download additional malware.
  • CompactGopher, a Go-based file collection utility dropped by LaxGopher to filter files of interest by extensions (.doc, .docx, .jpg, .xls, .xlsx, .txt, .pdf, .ppt, and .pptx.), compress them into ZIP files, encrypt the archives using AES-CFB-128, and exfiltrate them to file[.]io.
  • RatGopher, a Go-based backdoor that uses a private Discord server to receive C&C messages, execute commands, and publish the results back to the configured Discord channel, as well as upload and download files from file[.]io.
  • SSLORDoor, a C++-based backdoor that uses OpenSSL BIO for communication via raw sockets on port 443 to enumerate drives, perform file operations, and run commands based on C&C input via "cmd.exe."
  • FriendDelivery, a malicious DLL that serves as a loader and injector for BoxOfFriends.
  • BoxOfFriends, a Go-based backdoor that uses the Microsoft Graph API to craft draft emails for C2 using hard-coded credentials, with the earliest Outlook account created for this purpose ("barrantaya.1010@outlook[.]com") created on July 11, 2024.

"Timestamp inspection of the Slack and Discord messages showed us that the bulk of them were being sent during working hours, i.e., between 8 a.m. and 5 p.m., which aligns with China Standard Time," ESET researcher Eric Howard said. "Furthermore, the locale for the configured user in Slack metadata was also set to this time zone. We therefore believe that GopherWhisper is a China-aligned group."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/china-linked-gopherwhisper-infects-12.html
如有侵权请联系:admin#unsafe.sh