Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (security.com) Harvester APT Group Deploys New GoGra Linux Backdoor Targeting South Asia Using Microsoft Graph API for C2

(security.com) Harvester APT Group Deploys New GoGra Linux Backdoor Targeting South Asia Using Microsoft Graph API for C2

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (security.com) Harvester APT Group Deploys New GoGra Linux Backdoor Targeting South Asia Using Microsoft Graph API for C2

    New Linux variant of GoGra backdoor attributed to Harvester APT leverages Microsoft Graph API for C2 over Outlook mailboxes, targeting South Asia.

    In brief - Harvester APT, a suspected nation-state actor, has deployed a Linux version of its GoGra backdoor. The malware abuses Microsoft Graph API and Outlook for covert C2, using decoy documents tied to Indian and Afghan cultural references. Persistence is achieved via systemd and XDG autostart, with AES-CBC encryption securing communications.

    Technically - GoGra Linux is a 5.9 MB i386 ELF delivered via Go dropper, disguised as a PDF. It establishes persistence through a systemd user unit and XDG autostart entry, masquerading as Conky. Hardcoded Azure AD credentials enable OAuth2 token acquisition, polling an Outlook folder ('Zomato Pizza') every 2 seconds. Commands are received via emails with 'Input' subject, decrypted using AES-CBC (key: b14ca5898a4e4133bbce2ea2315a1916), and executed via /bin/bash. Results are encrypted and returned with 'Output' subject, followed by deletion of the tasking email. Shared typos (e.g., 'ExcuteCommand') confirm codebase overlap with Windows variants.

    Source: https://www.security.com/threat-intelligence/harvester-new-linux-backdoor-gogra

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups