China-Linked APT GopherWhisper Exploits Legitimate Services in Government Cyber Attacks
A newly identified advanced persistent threat (APT) group, named GopherWhisper, has been exploiting legitimate services for command-and-control (C&C) communication and data exfiltration, according to cybersecurity firm ESET. The group, believed to be operating out of China, has been active since at least November 2023. GopherWhisper came to attention in January 2025 during an investigation into a Go-based backdoor found on the systems of a governmental entity in Mongolia. This led to the discovery of several other backdoors, custom loaders, and injectors associated with the group. The backdoor, dubbed LaxGopher, uses Slack for C&C communication and can execute commands, exfiltrate data, and deploy additional payloads. Other tools in their arsenal include CompactGopher, a file collector, and RatGopher, a Go-based backdoor using Discord for communication. The group has also used a C++ backdoor called SSLORDoor and other tools like BoxOfFriends and FriendDelivery. ESET's investigation revealed that GopherWhis...