A newly identified advanced persistent threat (APT) group known as GopherWhisper has been observed targeting government entities through cyber-espionage operations. The group abuses legitimate platforms such as Microsoft Outlook, Slack, and Discord to establish covert command-and-control (C2) channels. By leveraging trusted services, attackers are able to blend malicious activity with normal enterprise traffic, making detection significantly more difficult. The campaign, active since at least 2023, utilizes multiple custom malware families developed in Go and C++ to maintain persistence, execute commands, and exfiltrate sensitive data. The attack works by deploying backdoors like LaxGopher and RatGopher, which communicate with attacker-controlled Slack channels or Discord servers to receive instructions. A more stealthy technique involves using Microsoft Graph API via Outlook draft emails, allowing commands to be hidden within legitimate email workflows. Additional tools enable payload delivery, process injection, and compressed data exfiltration to public file-sharing platforms. This multi-channel communication strategy ensures redundancy and resilience, allowing attackers to maintain access even if one vector is blocked. To mitigate such threats, organizations should closely monitor API-based communications and restrict unnecessary integrations with SaaS platforms. Enforcing multi-factor authentication, rotating API credentials, and implementing endpoint detection and response (EDR) solutions are critical. Regular auditing of outbound traffic and proactive threat hunting for unusual SaaS activity can help identify and contain such sophisticated attacks early.
Hackers are exploiting fake CAPTCHA pages to trick users into sending large volumes of international SMS messages, turning routine “prove you’re human” checks into a profitab...
A critical vulnerability has been identified in the Breeze Cache plugin for WordPress, actively exploited by attackers to upload arbitrary files without authentication. Tracked as ...
UNC6692 is a threat cluster conducting targeted social engineering campaigns by impersonating IT helpdesk staff through Microsoft Teams. Instead of exploiting software vulnerabilit...