Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

    April 25, 2026

    I Am Artemis: Peter Rossoni

    April 25, 2026

    Infinix GT 50 Pro unboxing

    April 25, 2026
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Cybersecurity»China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks
    China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks
    Cybersecurity

    China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

    The Tech GuyBy The Tech GuyApril 25, 2026No Comments3 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement


    A newly uncovered APT is relying on legitimate services for command-and-control (C&C) communication and data exfiltration, ESET warns.

    Advertisement

    Tracked as GopherWhisper (PDF) and active since at least November 2023, the hacking group is operating out of China, as timestamp inspection of chat messages and emails has revealed.

    The APT came to the spotlight in January 2025, during the investigation into a Go-based backdoor found on the systems of a governmental entity in Mongolia, which led to the identification of several other backdoors, custom loaders, and injectors associated with the group.

    Dubbed LaxGopher, the backdoor uses Slack for C&C communication and can execute commands via command prompt, exfiltrate victim data, and fetch and execute additional payloads on the infected machines. GopherWhisper, ESET says, mainly used LaxGopher to enumerate drives and files.

    An injector named JabGopher is used to execute the backdoor in the memory of a newly spawned instance of svchost.exe.

    One of the tools that LaxGopher can deploy is CompactGopher, a file collector written in Go that can compress files from the command line and send them to the file.io file-sharing service using a public REST API.

    Advertisement. Scroll to continue reading.

    Another tool in GopherWhisper’s arsenal is RatGopher, a Go-based backdoor. Unlike LaxGopher, it uses Discord for C&C communication. It can open new instances of the command prompt and upload or download files from file.io.

    The APT also relies on a C++ backdoor called SSLORDoor, which uses OpenSSL BIO for communication via raw TCP sockets. The malware can spawn a hidden command prompt process, enumerate drives, execute commands related to file manipulation, and create new socket connections.

    ESET’s investigation uncovered two additional tools that GopherWhisper deployed against the same Mongolian government organization, namely the BoxOfFriends Go backdoor that relies on the Microsoft Graph API for communication via draft Outlook messages, and the FriendDelivery DLL injector that loads it.

    The BoxOfFriends backdoor can exfiltrate files, manipulate ports, and execute supplied commands through a shell opened on the host.

    The China-linked APT infected roughly 12 systems within the victim Mongolian governmental institution. According to ESET, dozens of other victims were likely targeted as well.

    “Due to the lack of similarities in code, TTPs, and targeting to any existing APT group, we have created GopherWhisper as a new group and attribute the described toolset to it,” ESET notes.

    Related: US Federal Agency’s Cisco Firewall Infected With ‘Firestarter’ Backdoor

    Related: Trump Administration Vows Crackdown on Chinese Companies ‘Exploiting’ AI Models Made in US

    Related: Chinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude Mythos

    Related: New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention

    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World’s Biggest Exercise

    April 25, 2026

    In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

    April 25, 2026

    Pre-Stuxnet Sabotage Malware ‘Fast16’ Linked to US-Iran Cyber Tensions

    April 24, 2026

    Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

    April 24, 2026

    Copperhelm Raises $7 Million for Agentic Cloud Security Platform

    April 24, 2026

    Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks

    October 12, 2025
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    ChatGPT Group Chats are here … but not for everyone (yet)

    November 14, 20258 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

    April 25, 2026

    I Am Artemis: Peter Rossoni

    April 25, 2026

    Infinix GT 50 Pro unboxing

    April 25, 2026
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.