China-Linked GopherWhisper APT Hits 12 Mongolian Gov Systems Using Slack/Discord C2

Share
Minimalist white line art of a stylized gopher silhouette with a white Slack logo inside its chest, overlaid on a solid emerald green background.

ESET discovers a new espionage group abusing legitimate cloud services for command-and-control against strategically sensitive Mongolian targets.

ULAN BATOR, MN — Researchers at ESET have uncovered a sophisticated, China-aligned espionage campaign targeting the Mongolian government. The threat actor, dubbed GopherWhisper, has successfully infected at least 12 government systems since late 2023, utilizing a modular arsenal of Go-based malware.

What distinguishes GopherWhisper is its heavy reliance on "Living-off-the-Land" (LotL) cloud techniques. By hijacking legitimate communications platforms like Slack, Discord, and Microsoft 365 Outlook for its command-and-control (C2) infrastructure, the group has effectively bypassed traditional network monitoring that often white-lists these services.


Breach Audit: The GopherWhisper Toolkit

The infection chain typically begins with a specialized injector known as JabGopher, which side-loads the primary payload into legitimate system processes like svchost.exe. Once established, the core backdoor—LaxGopher—takes over operations. LaxGopher is a modular Go-based tool that retrieves instructions via private Slack API tokens and exfiltrates stolen data using the file.io sharing service to avoid raising red flags.

Threat Intelligence: GopherWhisper (Jan 2025 – April 2026)
Audit Detail Technical Finding
Confirmed Victims 12 Mongolian governmental institutions (ESET telemetry).
C2 Infrastructure Slack, Discord, Microsoft 365 Outlook, and file.io.
Core Malware LaxGopher (Backdoor) & JabGopher (Injector).

Geopolitical Context: Mongolia as a High-Value Target

Mongolia sits in a precarious geopolitical position as a landlocked buffer state between Russia and China. As a candidate for a deeper NATO partnership and a nation with significant mineral resources, its government systems are prime targets for nation-state espionage. GopherWhisper follows a long history of China-linked operations in the region, including previous campaigns attributed to Mustang Panda (APT27).

This operation highlights the persistent threat posed by China’s cyber apparatus, which increasingly favors modular, Go-based malware for its cross-platform compatibility and ease of development.


The CyberSignal Analysis

Signal 01 — The Cloud Stealth Advantage

By abusing Slack and Discord, GopherWhisper turns essential business tools into weapons. Security teams often struggle to block this traffic without disrupting legitimate operations. To counter this, organizations must move toward advanced living-off-the-land monitoring that inspects the intent of cloud API calls rather than just the destination.

Signal 02 — The Modular Evolution

The use of the Go programming language allows GopherWhisper to iterate rapidly. Their toolkit includes separate collectors, loaders, and backdoors, making it easier to swap out components if one is detected. This modularity is becoming a hallmark of sophisticated state-sponsored actors seeking long-term persistence in high-value networks.


Sources

Type Source
Technical Lead ESET Research: GopherWhisper Analysis
Industry News The Hacker News: Mongolian Gov Targeted
Strategic Audit The Record: Slack & Discord Abuse Report

Read more