Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Harvester: APT Group Expands Toolset With New GoGra Linux Backdoor

0
Medium
Published: Fri May 01 2026 (05/01/2026, 17:53:06 UTC)
Source: AlienVault OTX General

Description

The Harvester APT group has developed a new Linux variant of its GoGra backdoor malware. This backdoor uses legitimate Microsoft Graph API and Outlook mailboxes as a covert command-and-control channel, polling a mailbox folder every two seconds using hardcoded Azure AD credentials. It employs social engineering with tailored decoy documents to disguise malicious ELF files as normal documents. Initial detections originated from India and Afghanistan, indicating these regions as primary targets. The Linux version shares nearly identical code with a previously known Windows variant, showing the group's multi-platform capabilities and focus on South Asian espionage. No official patch or remediation guidance is currently available. There are no known exploits in the wild reported at this time.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/04/2026, 14:51:23 UTC

Technical Analysis

Harvester, an APT group, has expanded its toolset with a new Linux version of the GoGra backdoor. This malware leverages the Microsoft Graph API and Outlook mailboxes for covert command-and-control communication, using hardcoded Azure AD credentials to poll a mailbox folder at two-second intervals. Commands are received via encrypted emails, and results are exfiltrated through reply messages. The malware uses social engineering lures with decoy documents to mask malicious ELF files. The Linux variant's code closely matches a previously known Windows version, including identical spelling errors, indicating a shared development lineage. Initial VirusTotal submissions came from India and Afghanistan, suggesting these as primary target regions. There is no indication of known exploits in the wild or official patches.

Potential Impact

This malware enables persistent covert command-and-control communication on infected Linux systems via legitimate Microsoft cloud services, potentially allowing the attacker to execute arbitrary commands and exfiltrate data stealthily. The use of hardcoded Azure AD credentials and polling of mailbox folders every two seconds facilitates continuous control and data theft. The social engineering aspect increases the likelihood of initial infection. The targeting of South Asian regions indicates a focused espionage campaign. No known exploits in the wild have been reported yet.

Mitigation Recommendations

No official patch or remediation guidance is currently available for this threat. Organizations should monitor for indicators of compromise such as the provided file hashes and unusual use of Microsoft Graph API or mailbox polling behaviors. Since this malware uses hardcoded credentials and mailbox polling, restricting and monitoring Azure AD credentials and mailbox access may help detect or limit impact. Follow vendor advisories and threat intelligence updates for any future remediation or detection tools. No cloud service patching applies as this is not a cloud-hosted service.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.security.com/threat-intelligence/harvester-new-linux-backdoor-gogra"]
Adversary
Harvester
Pulse Id
69f4e882199e1fa40cbece45
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashb14ca5898a4e4133bbce2ea2315a1916
hash8f1af2175403195726957dc58fe64821
hashc78c6f9b78e9503ab1a079010cf12a6182ec4d43
hash2d0177a00bed31f72b48965bee34cec04cb5be8eeea66ae0bb144f77e4d439b1
hash57cd5721bae65c29e58121b5a9b00487a83b6c37dded56052cab2a67f90ea943
hash74ac41406ce7a7aa992f68b4b3042f980027526f33ec6c8d84cb26f20495c9dc
hash9c23c65a8a392a3fd885496a5ff2004252f1ad4388814b20e5459695280b0b82
hashd8d84eaba9b902045ae4fe044e9761ad0ce9051b85feea3f1cf9c80b59b2b123
hash1e8a11249ac38ca948a10308cc333a47
hash7bf2191620c2cca5f8238834149ba470
hashabfe90bd06b0781a075ed23757822816
hashd69cc848443b63eb0ae8d05a6ecfba5e
hash4d9ae84166f2083a1ee7f3e7a0b3581e4b41bc4b
hash7f58210fa9fb9a154a8c9b4d595f10c3ef7f79ec
hasha225c68ddfaa81bc3f13bbfc65a85b4e047e8aa5
hashafce743ccdd089a4132aad647ed47ba13b3f83b0

Threat ID: 69f8af02cbff5d86102ac3c9

Added to database: 5/4/2026, 2:36:50 PM

Last enriched: 5/4/2026, 2:51:23 PM

Last updated: 5/4/2026, 5:03:18 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses