GopherWhisper APT Abuses Discord and Slack to Spy on Mongolia
ESET uncovers GopherWhisper, a China-aligned APT using Go-based backdoors and legitimate cloud services like Discord, Slack, and Outlook to target Mongolian government systems.
A previously unknown China-aligned threat group has compromised at least 12 systems within Mongolian government institutions, according to ESET Research. The group, dubbed GopherWhisper, stands out for its heavy reliance on Go-based backdoors and abuse of legitimate cloud services—Discord, Slack, and Microsoft 365 Outlook—for command-and-control communications.
ESET researchers first discovered the group in January 2025 when they found an undocumented backdoor called LaxGopher on a system belonging to a Mongolian government entity. Further investigation revealed the group had been active since at least November 2023, building out a sophisticated toolkit designed to evade detection by blending into normal enterprise traffic.
What is GopherWhisper?
GopherWhisper is a China-aligned advanced persistent threat group targeting governmental institutions in Mongolia. The name reflects the group's preference for Go-based (Gopher) malware and its stealthy operational approach. Unlike many APT groups that rely on custom C2 infrastructure, GopherWhisper hides its communications within legitimate cloud platforms that organizations typically allow through firewalls.
How the Attack Works
The campaign deploys a modular toolkit consisting of four backdoors and several supporting utilities:
Go-Based Backdoors:
- LaxGopher uses Slack workspaces for C2, executing commands via cmd.exe and downloading additional payloads
- RatGopher operates through private Discord servers, handling command execution and file operations via file.io
- CompactGopher collects documents (.doc, .docx, .xls, .xlsx, .pdf, .ppt, .pptx), compresses them with AES-CFB-128 encryption, and exfiltrates through file.io
- BoxOfFriends abuses Microsoft Graph API to create draft emails in compromised Outlook accounts for C2
Supporting Tools:
- JabGopher injects and executes the LaxGopher backdoor DLL (whisper.dll)
- FriendDelivery serves as a malicious DLL loader for BoxOfFriends
- SSLORDoor is a C++-based backdoor using OpenSSL on port 443 for file operations
The reliance on Discord, Slack, and Outlook makes network-based detection challenging. These services generate substantial legitimate traffic in most organizations, and the encrypted channels they provide give attackers a degree of plausible cover. This technique mirrors approaches seen in other APT campaigns targeting critical infrastructure, where blending with legitimate traffic has become standard practice.
Attribution Evidence
ESET's attribution to China rests on several factors. Analysis of C&C message timestamps showed activity concentrated between 8 a.m. and 5 p.m., aligning with China Standard Time working hours. Slack metadata also indicated the configured user locale matched this timezone. The earliest known attacker-controlled Outlook account ([email protected]) was created on July 11, 2024.
Scale of Compromise
Telemetry shows approximately 12 systems within the targeted Mongolian governmental institution were infected. But the picture may be worse—C&C traffic analysis from attacker-controlled Discord and Slack servers suggests "dozens of other victims" beyond the confirmed infections. The full scope of GopherWhisper's operations remains unclear.
Detection and Defense
Organizations should monitor for:
- Unusual Discord/Slack traffic from endpoints that don't normally use these services
- Microsoft Graph API calls creating draft emails, especially to unfamiliar accounts
- File.io uploads from non-standard processes
- Go binaries exhibiting backdoor behavior (command execution, file operations)
The campaign demonstrates how nation-state actors continue adapting their techniques to bypass traditional defenses. By weaponizing trusted cloud services, GopherWhisper achieves persistence while avoiding the infrastructure costs and operational risks of maintaining custom C2 servers.
Why This Matters
Mongolia's position between Russia and China makes it a persistent target for espionage operations. The discovery of GopherWhisper adds another actor to the already crowded landscape of threats facing the region. For defenders elsewhere, the campaign offers a preview of where APT tradecraft is heading—away from suspicious standalone infrastructure and toward abuse of the platforms organizations already trust.
Security teams should review their visibility into cloud service usage patterns. If you can't distinguish between legitimate Slack messages and malware beacons, you've got a gap that groups like GopherWhisper will exploit. For more context on how nation-state actors operate, our recommended cybersecurity books include detailed analysis of similar campaigns.
Related Articles
Phantom Taurus Deploys Net-Star Backdoors Across Africa
Unit 42 exposes Phantom Taurus, a Chinese APT targeting embassies and foreign ministries with fileless NET-STAR malware. The group resurfaces within hours after discovery.
Apr 4, 2026Chinese APT Hijacked TrueConf Updates to Backdoor Governments
Operation TrueChaos exploited CVE-2026-3502 in TrueConf video conferencing to deploy Havoc malware across Southeast Asian government networks.
Apr 1, 2026Salt Typhoon Affiliate Hits Telecoms in 30+ Countries With TernDoor
China-linked UAT-9244 deploys TernDoor backdoor and peer-to-peer implants against telecom infrastructure across South America, North America, and Europe.
Mar 13, 2026Google Disrupts UNC2814 GRIDTIDE Campaign Targeting 53 Orgs
China-linked UNC2814 breached 53 organizations across 42 countries using GRIDTIDE malware that abuses Google Sheets for C2. Google terminates attacker infrastructure.
Mar 2, 2026