New 'GopherWhisper' APT Group Linked to China Targets Mongolian Government

Undocumented GopherWhisper APT Abuses Slack and Discord for C2 in Espionage Campaign Against Mongolian Government

HIGH
April 24, 2026
5m read
Threat ActorMalwareCyberattack

Related Entities

Threat Actors

GopherWhisper

Organizations

Other

LaxGopherRatGopherBoxOfFriendsCompactGopher

Full Report

Executive Summary

Researchers at ESET have identified a previously undocumented advanced persistent threat (APT) group, which they have named GopherWhisper. This China-aligned group is focused on cyber-espionage and has been active since at least November 2023. The group was discovered after a novel backdoor was detected on the network of a government institution in Mongolia in January 2025. GopherWhisper employs a large, modular toolkit written primarily in the Go programming language. A defining feature of their operations is the heavy reliance on legitimate commercial services for command-and-control (C2) communications, a technique designed to blend in with normal network traffic. The group uses Slack, Discord, and Microsoft 365 Outlook for C2, and the file.io service for data exfiltration, making their activities difficult to detect with traditional network security tools.

Threat Overview

Threat Actor: GopherWhisper (China-aligned) Targets: Mongolian governmental institutions, with other potential victims identified. Malware Toolkit (Go-based):

  • Backdoors: LaxGopher (Slack C2), RatGopher (Discord C2), BoxOfFriends (Outlook C2)
  • Injector: JabGopher
  • Loader: FriendDelivery
  • Exfiltration Tool: CompactGopher Objective: Long-term cyber-espionage and data theft.

ESET's investigation revealed that at least 12 systems within the targeted Mongolian government organization were infected. By recovering API tokens used by the malware, the researchers gained access to the attackers' C2 channels, providing deep insight into their operations and uncovering dozens of other potential victims.

Technical Analysis

GopherWhisper's TTPs are notable for their focus on stealth and evasion by abusing trusted services.

  • Initial Access: The initial vector for the Mongolian government intrusion was not specified in the reports.
  • Execution & Persistence: The attack likely involves a dropper that executes the FriendDelivery loader, which in turn deploys one of the backdoors. Persistence mechanisms were not detailed but are typical for APT groups.
  • Command and Control: This is the most innovative aspect of GopherWhisper's toolkit.
    • T1102.003 - Dead-Drop Resolver: The group uses various services as dead drops to pass commands and data.
    • LaxGopher uses the Slack API to post messages with exfiltrated data to a private channel and read new messages for commands.
    • RatGopher uses the Discord API and webhooks for C2 in a similar fashion.
    • BoxOfFriends uses the Microsoft Graph API to create, read, and delete draft emails in a compromised Outlook account. Commands are placed in drafts, and results are written back, with the drafts being deleted after use.
  • Exfiltration: (T1567.002 - Exfiltration to Cloud Storage) The CompactGopher tool is used to exfiltrate stolen data via the legitimate file-sharing service file.io.

This 'Living off the Trusted Service' approach makes detection extremely challenging. Network defenders cannot simply block IPs associated with Slack, Discord, or Microsoft 365, as this would disrupt business operations.

Impact Assessment

The compromise of a government institution by a sophisticated APT group like GopherWhisper represents a significant national security breach for Mongolia. The attackers likely gained long-term access to sensitive government networks, allowing them to steal state secrets, monitor official communications, and gather intelligence aligned with the strategic interests of the Chinese state. The operational security of the targeted institution is severely undermined. The discovery of dozens of other potential victims suggests a broader espionage campaign that could have regional implications. This incident highlights the growing trend of APTs using Go-lang for cross-platform malware and abusing legitimate cloud services to bypass traditional security defenses.

IOCs — Directly from Articles

No specific file hashes or C2 domains were provided in the source articles, as the C2 infrastructure is hosted on legitimate services.

Cyber Observables — Hunting Hints

Detection requires moving beyond IP/domain blocking and focusing on behavioral anomalies.

Type
url_pattern
Value
slack.com/api/chat.postMessage
Description
An unusual or unauthorized process making API calls to post messages to Slack.
Type
url_pattern
Value
discord.com/api/webhooks/
Description
An unusual or unauthorized process making API calls to Discord webhooks.
Type
url_pattern
Value
graph.microsoft.com/v1.0/me/mailFolders/drafts/messages
Description
An unusual process accessing Outlook draft messages via the Graph API.
Type
user_agent
Value
Go-http-client/1.1
Description
The default user agent for Go-lang's HTTP client. While not inherently malicious, its presence from an unexpected process could indicate a Go-based backdoor.
Type
network_traffic_pattern
Value
API calls to file.io from server systems
Description
The file.io service being used by server-side processes could be an indicator of the CompactGopher exfiltration tool.

Detection & Response

  • API Monitoring and Auditing: For services like Microsoft 365, enable and ingest detailed audit logs, including Graph API activity. Monitor for anomalous API usage patterns, such as a service account or user account suddenly accessing draft emails at a high frequency. This is a form of Cloud Service Dashboard Monitoring.
  • TLS/SSL Inspection: Implement TLS inspection on outbound web traffic to gain visibility into API calls being made to services like Slack and Discord. While this is privacy-sensitive and requires careful policy design, it is one of the few ways to see the content of the C2 traffic.
  • Endpoint Behavioral Analysis: Use an EDR to detect suspicious Go-lang binaries. Look for unsigned executables making persistent connections to the APIs of legitimate cloud services. The combination of a Go-http-client user agent and connections to Slack/Discord/Graph API from a non-browser process is a strong detection signal.
  • Response: If GopherWhisper activity is suspected, the API keys and tokens used by the malware must be revoked immediately within the respective cloud service (Slack, Discord, Microsoft 365). This will sever the C2 channel.

Mitigation

  • Restrict Application APIs: Where possible, use cloud provider controls to restrict which applications can access APIs. For example, in Microsoft Entra ID, you can control application permissions for the Graph API (M1054 - Software Configuration).
  • Egress Traffic Filtering: While blocking entire services is not feasible, consider blocking less common services like file.io if there is no business justification for their use. (M1037 - Filter Network Traffic).
  • Endpoint Hardening: Use application control to prevent the execution of unknown or unsigned Go-lang executables (M1038 - Execution Prevention).

Timeline of Events

1
November 1, 2023
GopherWhisper group assessed to have been active since at least this time.
2
January 1, 2025
ESET detects a novel backdoor on a Mongolian governmental institution's network, leading to the discovery of GopherWhisper.
3
April 24, 2026
This article was published

MITRE ATT&CK Mitigations

Filter and monitor outbound traffic to legitimate web services. While blocking is hard, anomalous patterns can be detected.

Mapped D3FEND Techniques:

Use EDR and antivirus solutions with behavioral analysis to detect suspicious activities from unknown Go-lang binaries.

Mapped D3FEND Techniques:

Use TLS inspection and URL filtering to gain visibility into and control over API calls to cloud services.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To detect GopherWhisper's C2, which hides within legitimate cloud service traffic, organizations must employ sophisticated Network Traffic Analysis with a focus on API monitoring. This requires deploying solutions like a Cloud Access Security Broker (CASB) or a next-generation firewall with TLS inspection capabilities. The goal is to move beyond IP/domain reputation and analyze the behavior of the traffic itself. Establish a baseline of normal API usage for services like Slack, Discord, and Microsoft Graph. Then, create alerts for anomalies such as: a non-browser process making API calls, an unusually high frequency of API calls to draft email folders, or a single endpoint communicating with all three services. Correlating these network events with endpoint data (e.g., the presence of a Go-http-client user agent from an unsigned process) can provide a high-confidence alert for this specific threat.

The BoxOfFriends backdoor's use of the Microsoft Graph API can be detected by monitoring authorization events within Microsoft 365. Configure audit logging for all Graph API activity and ingest these logs into a SIEM. Apply authorization event thresholding by creating rules that alert on suspicious patterns of access to the .../mailFolders/drafts/messages endpoint. For example, an alert could trigger if a user account or service principal accesses, creates, and deletes drafts more than X times in a minute, or if this activity occurs outside of normal business hours. This technique focuses on the behavior of the API interaction rather than the traffic's source or destination, making it an effective way to spot the abuse of legitimate credentials and APIs for C2, even when the traffic is encrypted and directed at a trusted Microsoft domain.

Timeline of Events

1
November 1, 2023

GopherWhisper group assessed to have been active since at least this time.

2
January 1, 2025

ESET detects a novel backdoor on a Mongolian governmental institution's network, leading to the discovery of GopherWhisper.

Sources & References

GopherWhisper: A burrow full of malware
WeLiveSecurity (welivesecurity.com) April 23, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APTGopherWhisperChinaCyber EspionageGoMalwareSlackDiscordMicrosoft Graph API

📢 Share This Article

Help others stay informed about cybersecurity threats