New GoGra Malware - Linux Variant Uses Microsoft Graph API

A new Linux variant of GoGra malware is using Microsoft Graph API for stealthy operations. Targeting government and telecom sectors, this poses significant risks. Stay informed and protect your systems.

Malware & RansomwareHIGHUpdated: Published:
Featured image for New GoGra Malware - Linux Variant Uses Microsoft Graph API

Original Reporting

BCBleepingComputer·Bill Toulas

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, a new malware for Linux uses Microsoft email tools to hide and deliver harmful commands.

What Happened

A new variant of the GoGra backdoor has emerged, specifically targeting Linux systems. This malware utilizes legitimate Microsoft infrastructure, particularly the Microsoft Graph API, to stealthily deliver payloads. Developed by the Harvester espionage group, this malware is designed to operate under the radar, making it a significant threat.

How It Works

The Linux GoGra backdoor operates by tricking victims into executing ELF binaries disguised as PDF files. Once executed, the malware establishes persistence through systemd and an XDG autostart entry, masquerading as the legitimate Conky system monitor. This clever disguise helps it avoid detection.

The malware uses hardcoded Azure Active Directory (AD) credentials to authenticate with Microsoft's cloud services, allowing it to obtain OAuth2 tokens. With these tokens, it can interact with Outlook mailboxes via the Microsoft Graph API. Specifically, it monitors a mailbox folder named “Zomato Pizza”, checking for emails with subject lines starting with “Input.”

When such an email is found, the malware decrypts its contents and executes the commands locally. After processing, it sends the results back to the attacker via reply emails with the subject “Output.” To further cover its tracks, the malware deletes the original command email after execution.

Who's Being Targeted

The Harvester group, believed to be state-backed, has a history of targeting sectors such as telecommunications, government, and IT organizations in South Asia. The introduction of this Linux variant indicates an expansion of their targeting capabilities, potentially affecting a broader range of systems.

Signs of Infection

Indicators of infection may include:

🔴

Unusual processes running

Unusual processes running on Linux systems, especially those mimicking legitimate applications.

🟡

Emails in Outlook

Emails in Outlook with suspicious subject lines or unexpected attachments.

🟠

Changes to system

Changes to system startup configurations that are not authorized.

How to Protect Yourself

To safeguard against this malware: The emergence of the Linux variant of GoGra is a clear sign that cyber threats are evolving. Organizations must remain vigilant and proactive in their cybersecurity measures to combat these sophisticated attacks.

Detection

  • 1.Ensure that your systems are updated with the latest security patches.
  • 2.Monitor email communications for suspicious activity, especially from unknown sources.

Removal

  • 3.Implement strict access controls for Azure AD credentials to prevent unauthorized access.
  • 4.Use endpoint detection and response (EDR) solutions to identify and mitigate threats.

🔒 Pro Insight

🔒 Pro insight: The use of Microsoft Graph API for command and control highlights a trend of malware leveraging legitimate services for evasion tactics.

BCBleepingComputer· Bill Toulas
Read Original

Related Pings