top of page

GopherWhisper APT: China-Linked Campaign Deploys Go-Based Malware Against Mongolian Government

  • 18 hours ago
  • 2 min read

KEY FINDINGS


  • ESET discovered GopherWhisper, a previously undocumented China-aligned APT group targeting Mongolian government institutions

  • The group uses a toolkit primarily written in Go, including custom loaders, injectors, and multiple backdoors

  • GopherWhisper abuses legitimate platforms like Discord, Slack, Outlook, and file.io for command-and-control and data exfiltration

  • At least 12 systems within a Mongolian government entity were confirmed infected, with dozens more suspected

  • Analysis of exposed C&C messages revealed operator activity during UTC+8 working hours, consistent with Chinese government operations


BACKGROUND


ESET researchers uncovered GopherWhisper in January 2025 after identifying the LaxGopher backdoor on a Mongolian government system. The discovery led to a full investigation that revealed a comprehensive and previously unknown toolkit. The group's use of exclusively custom Go-based malware with no connections to known threat actors warranted a new attribution. Analysis of the group's infrastructure and operational patterns suggests an organized, well-resourced cyber-espionage operation aligned with Chinese government interests.


MALWARE ARSENAL


GopherWhisper deploys multiple specialized tools designed for persistent access and data theft. JabGopher functions as an injector, deploying LaxGopher into svchost.exe for process injection. LaxGopher serves as a primary backdoor communicating via Slack, executing commands, and downloading additional payloads including CompactGopher, which compresses and exfiltrates files. RatGopher uses Discord channels for command execution, while SSLORDoor handles file operations over encrypted sockets. FriendDelivery acts as a loader for deploying other components, and BoxOfFriends leverages Microsoft 365 Outlook APIs to establish covert command-and-control communication through draft emails.


COMMAND-AND-CONTROL INFRASTRUCTURE


The group's operational security relied on legitimate cloud platforms rather than traditional malicious infrastructure. Slack channels primarily handled file and disk commands and contained links to GitHub repositories used for malware development. Discord servers hosted early backdoor code and revealed operational details about attacker machines, including VMware-based testing environments. Outlook accounts supported communication through draft emails, with account creation timelines directly correlating to malware development dates. Researchers extracted thousands of messages from these platforms after identifying exposed API tokens, providing unprecedented visibility into the group's inner workings.


OPERATIONAL TIMELINE AND EVIDENCE


The investigators discovered the Outlook account barrantaya.1010@outlook.com was created on July 11, 2024, just eleven days before FriendDelivery was compiled on July 22, 2024. This tight timeline between account creation and malware development suggests deliberate coordination. Activity patterns showed operators consistently working during UTC+8 business hours, with Slack logs containing development discussions and GitHub references indicating active code creation and refinement. The researchers noted that attackers initially used these platforms to test malware functionality before reusing them for active operations without clearing logs, a significant operational security failure.


SCOPE OF COMPROMISE


Within the targeted Mongolian government entity, ESET confirmed approximately twelve infected systems. However, analysis of C&C traffic across Slack and Discord channels indicates significantly more victims remain unidentified. The scope and sophistication of the toolkit suggests an operation targeting multiple government agencies and possibly extending beyond Mongolia's borders. The volume of communication logs and the breadth of operational infrastructure indicates this represents an ongoing, active campaign rather than a one-time espionage effort.


Sources


  • https://securityaffairs.com/191318/apt/gopherwhisper-new-china-linked-apt-targets-mongolia-with-go-based-malware.html

  • https://thehackernews.com/2026/04/china-linked-gopherwhisper-infects-12.html

  • https://www.cybersecurity-help.cz/blog/5373.html

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page