A Linux variant of the GoGra backdoor uses legitimate Microsoft infrastructure, relying on an Outlook inbox for stealthy payload delivery.
Moreover, Harvester, an espionage group believed to be state-backed, develops the malware and leverages the Microsoft Graph API to access mailbox data, which makes it highly evasive.
Furthermore, Harvester has operated since at least 2021 and uses custom malicious tools, such as backdoors and loaders, in campaigns targeting telecommunications, government, and IT organizations in South Asia.
Initial Access Through Disguised Payloads
Meanwhile, Symantec researchers analyzed samples of the new Linux GoGra backdoor retrieved from VirusTotal and found that attackers gain initial access by tricking victims into executing ELF binaries disguised as PDF files.
In a report today, Symantec researchers say that the Linux version of the GoGra backdoor uses hardcoded Azure Active Directory (AD) credentials to authenticate to Microsoft’s cloud and obtain OAuth2 tokens. Consequently, it interacts with Outlook mailboxes via the Microsoft Graph API.
At the initial stage of the attack, a Go-based malware dropper deploys an i386 payload, establishes persistence via systemd, and creates an XDG autostart entry posing as the legitimate Conky system monitor for Linux and BSD.
Command-and-Control via Outlook Inbox
According to the researchers, the malware checks every two seconds an Outlook mailbox folder named “Zomato Pizza.” Additionally, it uses OData queries to identify incoming emails with subject lines beginning with “Input.”
Next, the malware decrypts the base64-encoded and AES-CBC-encrypted contents of these messages and executes the resulting commands locally.
Afterward, it AES-encrypts execution results and returns them to the operator via reply emails with the subject “Output.”
To reduce forensic visibility, the malware issues an HTTP DELETE request to remove the original command email after processing it.
Code Similarities and Attribution
Notably, Symantec highlights that the Linux variant of GoGra shares a nearly identical codebase with the Windows version of the malware, including the same typos in strings and function names, as well as the same AES key.
Therefore, this strongly suggests that the same developer created both pieces of malware, pointing to the Harvester threat group.
Finally, Symantec sees the emergence of a Linux GoGra variant as an indication that Harvester is expanding its toolset and targeting scope to tap into a broader range of systems.
Source: BleepingComputer, Bill Toulas
Read more at Impreza News






















