GopherWhisper - China-Linked APT Targets Mongolian Government

A new China-aligned APT group, GopherWhisper, has infected 12 Mongolian government systems. This highlights the growing threat of state-sponsored cyber attacks. Organizations must enhance their security measures to protect sensitive data.

Threat IntelHIGHUpdated: Published:
Featured image for GopherWhisper - China-Linked APT Targets Mongolian Government

Original Reporting

THThe Hacker News

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, a hacker group from China is attacking Mongolian government computers using special software.

The Threat

GopherWhisper is a newly identified advanced persistent threat (APT) group believed to be linked to China. This group has recently targeted Mongolian governmental institutions, successfully infecting 12 systems with a variety of malicious tools. The group’s operations were first uncovered in January 2025 when a unique backdoor named LaxGopher was detected on a government network.

Who's Behind It

According to ESET, a Slovakian cybersecurity firm, GopherWhisper utilizes a range of tools primarily written in Go. These tools include injectors and loaders designed to deploy various backdoors, allowing the attackers to maintain control over compromised systems. The group is suspected to be operating within the China Standard Time zone, as indicated by the timestamps of their communications.

Tactics & Techniques

GopherWhisper employs several sophisticated techniques to achieve its objectives:

  • Command and Control (C&C): The group uses legitimate services like Discord, Slack, and Microsoft 365 Outlook for C&C communication and data exfiltration.
  • Malware Arsenal: The group’s toolkit includes multiple backdoors such as:
    • LaxGopher: Executes commands and downloads additional malware via Slack.
    • CompactGopher: Collects files of interest and exfiltrates them in encrypted ZIP format.
    • RatGopher: Utilizes Discord for command execution and file transfer.
    • SSLORDoor: A C++ backdoor that communicates over port 443, allowing remote file operations.

Defensive Measures

Organizations, particularly those within the government sector, should be vigilant against such sophisticated threats. Here are some recommended actions:

Do Now

  • 1.Monitor Network Traffic: Keep an eye on unusual C&C communications, especially from services like Discord and Slack.
  • 2.Update Security Protocols: Ensure that all systems are patched and that security protocols are up to date to prevent unauthorized access.

Conclusion

The emergence of GopherWhisper highlights the ongoing risks posed by state-sponsored cyber threats. With their ability to infiltrate government systems, the potential for sensitive data compromise is significant. Continuous monitoring and proactive security measures are essential to mitigate these risks.

🔒 Pro Insight

🔒 Pro insight: GopherWhisper's use of legitimate platforms for C&C indicates a shift in APT tactics, making detection more challenging for traditional security measures.

THThe Hacker News
Read Original

Related Pings