Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

APT Group Expands Toolset With New GoGra Linux Backdoor

0
Medium
Published: Wed Apr 22 2026 (04/22/2026, 11:35:15 UTC)
Source: AlienVault OTX General

Description

The Harvester APT group has developed a highly-evasive Linux version of its GoGra backdoor that leverages Microsoft Graph API and Outlook mailboxes as a covert command-and-control channel to bypass traditional network defenses. Initial VirusTotal submissions originated from India and Afghanistan, indicating these regions as primary targets. The attackers use social engineering with tailored decoy documents masquerading as legitimate files, including references to Indian food delivery services. The backdoor uses hardcoded Azure AD credentials to poll mailboxes every two seconds, executing commands received via email and exfiltrating results back to operators. Analysis confirms this Linux variant shares nearly identical code with a previously known Windows version, including matching spelling errors, demonstrating the group's multi-platform development strategy and continued expansion of capabilities targeting South Asia for espionage purposes.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/22/2026, 15:47:04 UTC

Technical Analysis

The Harvester APT group expanded its GoGra backdoor to Linux, leveraging Microsoft Graph API and Outlook mailboxes for stealthy command-and-control communications. The malware uses hardcoded Azure AD credentials to poll mailboxes frequently, executing commands received via email and exfiltrating results back to operators. Social engineering tactics include tailored decoy documents with regional references to Indian food delivery services. Code analysis shows near-identical code with the Windows version, including matching spelling errors, demonstrating the group's cross-platform development and focus on South Asia espionage. No CVE or patch information is available, and no known exploits in the wild have been reported.

Potential Impact

This backdoor enables persistent, covert remote control of infected Linux systems by abusing legitimate Microsoft cloud services for command-and-control, potentially bypassing traditional network defenses. It allows attackers to execute arbitrary commands and exfiltrate sensitive data stealthily. The targeting of India and Afghanistan suggests espionage motives focused on South Asia. The use of hardcoded credentials and frequent mailbox polling increases the risk of detection if monitored but also indicates sophisticated operational tradecraft.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since this threat abuses hardcoded Azure AD credentials and Microsoft Graph API, organizations should monitor for unusual mailbox access patterns and consider rotating credentials and enforcing multi-factor authentication. Users should be cautious of social engineering lures, especially documents referencing local services. Network defenders should analyze mailbox activity and endpoint behaviors for signs of this backdoor. No official fix or patch is currently documented.

Affected Countries

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.security.com/blog-post/harvester-new-linux-backdoor-gogra"]
Adversary
Harvester
Pulse Id
69e8b27323474e048df8d7b1
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashb14ca5898a4e4133bbce2ea2315a1916
hash8f1af2175403195726957dc58fe64821
hashc78c6f9b78e9503ab1a079010cf12a6182ec4d43
hash2d0177a00bed31f72b48965bee34cec04cb5be8eeea66ae0bb144f77e4d439b1
hash57cd5721bae65c29e58121b5a9b00487a83b6c37dded56052cab2a67f90ea943
hash74ac41406ce7a7aa992f68b4b3042f980027526f33ec6c8d84cb26f20495c9dc
hash9c23c65a8a392a3fd885496a5ff2004252f1ad4388814b20e5459695280b0b82
hashd8d84eaba9b902045ae4fe044e9761ad0ce9051b85feea3f1cf9c80b59b2b123

Threat ID: 69e8e9b919fe3cd2cdc88289

Added to database: 4/22/2026, 3:31:05 PM

Last enriched: 4/22/2026, 3:47:04 PM

Last updated: 4/23/2026, 1:06:02 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses