Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»GopherWhisper APT group hides command and control traffic in Slack and Discord
    Cybersecurity

    GopherWhisper APT group hides command and control traffic in Slack and Discord

    adminBy adminApril 23, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    GopherWhisper APT group hides command and control traffic in Slack and Discord
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Attackers continue to lean on everyday collaboration platforms to hide command and control traffic inside normal enterprise noise. A newly identified China-aligned APT group pushes that trend further, running its operations through Slack workspaces, Discord servers, Outlook drafts, and the file.io sharing service.

    GopherWhisper APT

    GopherWhisper toolset overview

    ESET researchers have named the group GopherWhisper and tied it to an intrusion at a Mongolian governmental entity. The name draws on two elements: most of the group’s tooling is written in Go, whose mascot is a gopher, and one of its side-loaded components ships as whisper.dll.

    A toolset built mostly in Go

    GopherWhisper operates a set of custom loaders, injectors, and backdoors. The Go-based components include three backdoors, LaxGopher, RatGopher, and BoxOfFriends, along with the JabGopher injector, the CompactGopher exfiltration utility, and the FriendDelivery loader. A C++ backdoor called SSLORDoor rounds out the arsenal.

    Each backdoor pairs with a different legitimate service for command and control. LaxGopher pulls instructions from a private Slack workspace and posts results back to the same channel. RatGopher mirrors that design on Discord. BoxOfFriends takes a different route, using the Microsoft Graph API to exchange commands through Outlook draft messages. SSLORDoor communicates directly with the operators over an encrypted channel on port 443.

    The supporting tools handle the rest of the chain. JabGopher and FriendDelivery load the backdoors into memory, and CompactGopher packages selected files and ships them out through the file.io sharing service.

    Operator messages pulled from Slack, Discord, and Outlook

    The group’s reliance on commercial platforms for C&C cut both ways. After recovering multiple Slack and Discord API tokens during analysis, ESET retrieved a large volume of operator traffic from those services.

    “During our investigation, we managed to extract thousands of Slack and Discord messages, as well as several draft email messages from Microsoft Outlook. This gave us great insight into the inner workings of the group,” said ESET researcher Eric Howard, who discovered the new threat group.

    The Slack channel tied to LaxGopher carried mostly disk and file enumeration commands. It also contained links to public GitHub repositories covering Go service installation, process injection on x86 and x64, and encryption and compression utilities. ESET assesses that operators consulted these repositories during development.

    RatGopher’s Discord channel held Go source code that appears to be an earlier iteration of the backdoor, along with output from enumeration runs on operator machines. One of those machines was a VMware virtual machine whose install and boot timestamps line up with UTC+8.

    Message timestamps from both Slack and Discord cluster between 8 a.m. and 5 p.m. UTC+8, matching China Standard Time. The configured user locale in Slack metadata pointed to the same zone, supporting the China-aligned attribution.

    Outlook drafts reveal an infrastructure timeline

    Extraction of Outlook content exposed operational housekeeping failures on the attacker side. The welcome email from Microsoft, sent when the mailbox was provisioned, remained in place. That message confirmed that the account barrantaya.1010@outlook[.]com was created on July 11, 2024. The FriendDelivery DLL that loads BoxOfFriends was compiled 11 days later, on July 22, 2024.

    Investigators also determined that the Slack and Discord servers began life as test environments for the backdoors, and were later pressed into service as live C&C channels for LaxGopher and RatGopher across multiple compromised systems. Logs from the testing phase were never cleared, giving defenders a longer window into the group’s development and deployment activity.

    ESET has published indicators of compromise in its GitHub repository.

    Guide: Breach and Attack Simulation & Automated Penetration Testing

    APT Command control Discord GopherWhisper Group hides Slack Traffic
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle changes budget pacing rules for scheduled campaigns
    Next Article I change these 5 storage settings on every new PC build, and they prevent headaches later
    admin
    • Website

    Related Posts

    Continuous Observability as the Decision Engine

    April 24, 2026

    Regular Password Resets Aren’t as Safe as You Think

    April 24, 2026

    Vulnerabilities Patched in CrowdStrike, Tenable Products

    April 24, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    One bankruptcy just wiped out a popular Google TV lineup in Europe

    April 24, 2026

    Continuous Observability as the Decision Engine

    April 24, 2026

    Google spam reports with personally identifying information won’t be used and processed

    April 24, 2026

    I stopped switching to a terminal to run scripts once I found VS Code’s task runner

    April 24, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,486)
    • Privacy & Online Earning (181)
    • SEO & Digital Marketing (912)
    • Tech Tools & Mobile / Apps (1,772)
    • WiFi / Internet & Networking (243)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    One bankruptcy just wiped out a popular Google TV lineup in Europe

    April 24, 2026

    Continuous Observability as the Decision Engine

    April 24, 2026

    Google spam reports with personally identifying information won’t be used and processed

    April 24, 2026
    Most Popular
    • One bankruptcy just wiped out a popular Google TV lineup in Europe
    • Continuous Observability as the Decision Engine
    • Google spam reports with personally identifying information won’t be used and processed
    • I stopped switching to a terminal to run scripts once I found VS Code’s task runner
    • Regular Password Resets Aren’t as Safe as You Think
    • Google Won’t Act On Spam Reports If They Contain Personal Information
    • How to Sell on ChatGPT with WooCommerce (Agentic Guide)
    • Vulnerabilities Patched in CrowdStrike, Tenable Products
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.