Researchers at ESET have identified a previously undocumented advanced persistent threat (APT) group, which they have named GopherWhisper. This China-aligned group is focused on cyber-espionage and has been active since at least November 2023. The group was discovered after a novel backdoor was detected on the network of a government institution in Mongolia in January 2025. GopherWhisper employs a large, modular toolkit written primarily in the Go programming language. A defining feature of their operations is the heavy reliance on legitimate commercial services for command-and-control (C2) communications, a technique designed to blend in with normal network traffic. The group uses Slack, Discord, and Microsoft 365 Outlook for C2, and the file.io service for data exfiltration, making their activities difficult to detect with traditional network security tools.
Threat Actor: GopherWhisper (China-aligned) Targets: Mongolian governmental institutions, with other potential victims identified. Malware Toolkit (Go-based):
LaxGopher (Slack C2), RatGopher (Discord C2), BoxOfFriends (Outlook C2)JabGopherFriendDeliveryCompactGopher
Objective: Long-term cyber-espionage and data theft.ESET's investigation revealed that at least 12 systems within the targeted Mongolian government organization were infected. By recovering API tokens used by the malware, the researchers gained access to the attackers' C2 channels, providing deep insight into their operations and uncovering dozens of other potential victims.
GopherWhisper's TTPs are notable for their focus on stealth and evasion by abusing trusted services.
FriendDelivery loader, which in turn deploys one of the backdoors. Persistence mechanisms were not detailed but are typical for APT groups.T1102.003 - Dead-Drop Resolver: The group uses various services as dead drops to pass commands and data.T1567.002 - Exfiltration to Cloud Storage) The CompactGopher tool is used to exfiltrate stolen data via the legitimate file-sharing service file.io.This 'Living off the Trusted Service' approach makes detection extremely challenging. Network defenders cannot simply block IPs associated with Slack, Discord, or Microsoft 365, as this would disrupt business operations.
The compromise of a government institution by a sophisticated APT group like GopherWhisper represents a significant national security breach for Mongolia. The attackers likely gained long-term access to sensitive government networks, allowing them to steal state secrets, monitor official communications, and gather intelligence aligned with the strategic interests of the Chinese state. The operational security of the targeted institution is severely undermined. The discovery of dozens of other potential victims suggests a broader espionage campaign that could have regional implications. This incident highlights the growing trend of APTs using Go-lang for cross-platform malware and abusing legitimate cloud services to bypass traditional security defenses.
No specific file hashes or C2 domains were provided in the source articles, as the C2 infrastructure is hosted on legitimate services.
Detection requires moving beyond IP/domain blocking and focusing on behavioral anomalies.
slack.com/api/chat.postMessagediscord.com/api/webhooks/graph.microsoft.com/v1.0/me/mailFolders/drafts/messagesGo-http-client/1.1Go-http-client user agent and connections to Slack/Discord/Graph API from a non-browser process is a strong detection signal.M1054 - Software Configuration).file.io if there is no business justification for their use. (M1037 - Filter Network Traffic).M1038 - Execution Prevention).Filter and monitor outbound traffic to legitimate web services. While blocking is hard, anomalous patterns can be detected.
Mapped D3FEND Techniques:
Use EDR and antivirus solutions with behavioral analysis to detect suspicious activities from unknown Go-lang binaries.
Mapped D3FEND Techniques:
Use TLS inspection and URL filtering to gain visibility into and control over API calls to cloud services.
Mapped D3FEND Techniques:
To detect GopherWhisper's C2, which hides within legitimate cloud service traffic, organizations must employ sophisticated Network Traffic Analysis with a focus on API monitoring. This requires deploying solutions like a Cloud Access Security Broker (CASB) or a next-generation firewall with TLS inspection capabilities. The goal is to move beyond IP/domain reputation and analyze the behavior of the traffic itself. Establish a baseline of normal API usage for services like Slack, Discord, and Microsoft Graph. Then, create alerts for anomalies such as: a non-browser process making API calls, an unusually high frequency of API calls to draft email folders, or a single endpoint communicating with all three services. Correlating these network events with endpoint data (e.g., the presence of a Go-http-client user agent from an unsigned process) can provide a high-confidence alert for this specific threat.
The BoxOfFriends backdoor's use of the Microsoft Graph API can be detected by monitoring authorization events within Microsoft 365. Configure audit logging for all Graph API activity and ingest these logs into a SIEM. Apply authorization event thresholding by creating rules that alert on suspicious patterns of access to the .../mailFolders/drafts/messages endpoint. For example, an alert could trigger if a user account or service principal accesses, creates, and deletes drafts more than X times in a minute, or if this activity occurs outside of normal business hours. This technique focuses on the behavior of the API interaction rather than the traffic's source or destination, making it an effective way to spot the abuse of legitimate credentials and APIs for C2, even when the traffic is encrypted and directed at a trusted Microsoft domain.
GopherWhisper group assessed to have been active since at least this time.
ESET detects a novel backdoor on a Mongolian governmental institution's network, leading to the discovery of GopherWhisper.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats