APT Group Expands Toolset With New GoGra Linux Backdoor
The Harvester APT group has developed a highly-evasive Linux version of its GoGra backdoor that leverages Microsoft Graph API and Outlook mailboxes as a covert command-and-control channel to bypass traditional network defenses. Initial VirusTotal submissions originated from India and Afghanistan, indicating these regions as primary targets. The attackers use social engineering with tailored decoy documents masquerading as legitimate files, including references to Indian food delivery services. The backdoor uses hardcoded Azure AD credentials to poll mailboxes every two seconds, executing commands received via email and exfiltrating results back to operators. Analysis confirms this Linux variant shares nearly identical code with a previously known Windows version, including matching spelling errors, demonstrating the group's multi-platform development strategy and continued expansion of capabilities targeting South Asia for espionage purposes.
AI Analysis
Technical Summary
The Harvester APT group expanded its GoGra backdoor to Linux, leveraging Microsoft Graph API and Outlook mailboxes for stealthy command-and-control communications. The malware uses hardcoded Azure AD credentials to poll mailboxes frequently, executing commands received via email and exfiltrating results back to operators. Social engineering tactics include tailored decoy documents with regional references to Indian food delivery services. Code analysis shows near-identical code with the Windows version, including matching spelling errors, demonstrating the group's cross-platform development and focus on South Asia espionage. No CVE or patch information is available, and no known exploits in the wild have been reported.
Potential Impact
This backdoor enables persistent, covert remote control of infected Linux systems by abusing legitimate Microsoft cloud services for command-and-control, potentially bypassing traditional network defenses. It allows attackers to execute arbitrary commands and exfiltrate sensitive data stealthily. The targeting of India and Afghanistan suggests espionage motives focused on South Asia. The use of hardcoded credentials and frequent mailbox polling increases the risk of detection if monitored but also indicates sophisticated operational tradecraft.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since this threat abuses hardcoded Azure AD credentials and Microsoft Graph API, organizations should monitor for unusual mailbox access patterns and consider rotating credentials and enforcing multi-factor authentication. Users should be cautious of social engineering lures, especially documents referencing local services. Network defenders should analyze mailbox activity and endpoint behaviors for signs of this backdoor. No official fix or patch is currently documented.
Affected Countries
India, Afghanistan
Indicators of Compromise
- hash: b14ca5898a4e4133bbce2ea2315a1916
- hash: 8f1af2175403195726957dc58fe64821
- hash: c78c6f9b78e9503ab1a079010cf12a6182ec4d43
- hash: 2d0177a00bed31f72b48965bee34cec04cb5be8eeea66ae0bb144f77e4d439b1
- hash: 57cd5721bae65c29e58121b5a9b00487a83b6c37dded56052cab2a67f90ea943
- hash: 74ac41406ce7a7aa992f68b4b3042f980027526f33ec6c8d84cb26f20495c9dc
- hash: 9c23c65a8a392a3fd885496a5ff2004252f1ad4388814b20e5459695280b0b82
- hash: d8d84eaba9b902045ae4fe044e9761ad0ce9051b85feea3f1cf9c80b59b2b123
APT Group Expands Toolset With New GoGra Linux Backdoor
Description
The Harvester APT group has developed a highly-evasive Linux version of its GoGra backdoor that leverages Microsoft Graph API and Outlook mailboxes as a covert command-and-control channel to bypass traditional network defenses. Initial VirusTotal submissions originated from India and Afghanistan, indicating these regions as primary targets. The attackers use social engineering with tailored decoy documents masquerading as legitimate files, including references to Indian food delivery services. The backdoor uses hardcoded Azure AD credentials to poll mailboxes every two seconds, executing commands received via email and exfiltrating results back to operators. Analysis confirms this Linux variant shares nearly identical code with a previously known Windows version, including matching spelling errors, demonstrating the group's multi-platform development strategy and continued expansion of capabilities targeting South Asia for espionage purposes.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Harvester APT group expanded its GoGra backdoor to Linux, leveraging Microsoft Graph API and Outlook mailboxes for stealthy command-and-control communications. The malware uses hardcoded Azure AD credentials to poll mailboxes frequently, executing commands received via email and exfiltrating results back to operators. Social engineering tactics include tailored decoy documents with regional references to Indian food delivery services. Code analysis shows near-identical code with the Windows version, including matching spelling errors, demonstrating the group's cross-platform development and focus on South Asia espionage. No CVE or patch information is available, and no known exploits in the wild have been reported.
Potential Impact
This backdoor enables persistent, covert remote control of infected Linux systems by abusing legitimate Microsoft cloud services for command-and-control, potentially bypassing traditional network defenses. It allows attackers to execute arbitrary commands and exfiltrate sensitive data stealthily. The targeting of India and Afghanistan suggests espionage motives focused on South Asia. The use of hardcoded credentials and frequent mailbox polling increases the risk of detection if monitored but also indicates sophisticated operational tradecraft.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since this threat abuses hardcoded Azure AD credentials and Microsoft Graph API, organizations should monitor for unusual mailbox access patterns and consider rotating credentials and enforcing multi-factor authentication. Users should be cautious of social engineering lures, especially documents referencing local services. Network defenders should analyze mailbox activity and endpoint behaviors for signs of this backdoor. No official fix or patch is currently documented.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.security.com/blog-post/harvester-new-linux-backdoor-gogra"]
- Adversary
- Harvester
- Pulse Id
- 69e8b27323474e048df8d7b1
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashb14ca5898a4e4133bbce2ea2315a1916 | — | |
hash8f1af2175403195726957dc58fe64821 | — | |
hashc78c6f9b78e9503ab1a079010cf12a6182ec4d43 | — | |
hash2d0177a00bed31f72b48965bee34cec04cb5be8eeea66ae0bb144f77e4d439b1 | — | |
hash57cd5721bae65c29e58121b5a9b00487a83b6c37dded56052cab2a67f90ea943 | — | |
hash74ac41406ce7a7aa992f68b4b3042f980027526f33ec6c8d84cb26f20495c9dc | — | |
hash9c23c65a8a392a3fd885496a5ff2004252f1ad4388814b20e5459695280b0b82 | — | |
hashd8d84eaba9b902045ae4fe044e9761ad0ce9051b85feea3f1cf9c80b59b2b123 | — |
Threat ID: 69e8e9b919fe3cd2cdc88289
Added to database: 4/22/2026, 3:31:05 PM
Last enriched: 4/22/2026, 3:47:04 PM
Last updated: 4/23/2026, 1:06:02 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.