Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

Dubbed GopherWhisper, the group relies on multiple Go-based backdoors alongside custom loaders and injectors.

Chinese APT

A newly uncovered APT is relying on legitimate services for command-and-control (C&C) communication and data exfiltration, ESET warns.

Tracked as GopherWhisper (PDF) and active since at least November 2023, the hacking group is operating out of China, as timestamp inspection of chat messages and emails has revealed.

The APT came to the spotlight in January 2025, during the investigation into a Go-based backdoor found on the systems of a governmental entity in Mongolia, which led to the identification of several other backdoors, custom loaders, and injectors associated with the group.

Dubbed LaxGopher, the backdoor uses Slack for C&C communication and can execute commands via command prompt, exfiltrate victim data, and fetch and execute additional payloads on the infected machines. GopherWhisper, ESET says, mainly used LaxGopher to enumerate drives and files.

An injector named JabGopher is used to execute the backdoor in the memory of a newly spawned instance of svchost.exe.

One of the tools that LaxGopher can deploy is CompactGopher, a file collector written in Go that can compress files from the command line and send them to the file.io file-sharing service using a public REST API.

Advertisement. Scroll to continue reading.

Another tool in GopherWhisper’s arsenal is RatGopher, a Go-based backdoor. Unlike LaxGopher, it uses Discord for C&C communication. It can open new instances of the command prompt and upload or download files from file.io.

The APT also relies on a C++ backdoor called SSLORDoor, which uses OpenSSL BIO for communication via raw TCP sockets. The malware can spawn a hidden command prompt process, enumerate drives, execute commands related to file manipulation, and create new socket connections.

ESET’s investigation uncovered two additional tools that GopherWhisper deployed against the same Mongolian government organization, namely the BoxOfFriends Go backdoor that relies on the Microsoft Graph API for communication via draft Outlook messages, and the FriendDelivery DLL injector that loads it.

The BoxOfFriends backdoor can exfiltrate files, manipulate ports, and execute supplied commands through a shell opened on the host.

The China-linked APT infected roughly 12 systems within the victim Mongolian governmental institution. According to ESET, dozens of other victims were likely targeted as well.

“Due to the lack of similarities in code, TTPs, and targeting to any existing APT group, we have created GopherWhisper as a new group and attribute the described toolset to it,” ESET notes.

Related: US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor

Related: Trump Administration Vows Crackdown on Chinese Companies ‘Exploiting’ AI Models Made in US

Related: Chinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude Mythos

Related: New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.