Threat Advisory

Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

Threat: Malware
Threat Actor Name: Harvester
Threat Actor Type: Nation-Sponsored or State-Sponsored
Targeted Region: Global
Threat Actor Region: South Asia
Targeted Sector: Technology & IT
Criticality: High
[subscribe_to_unlock_form]

EXECUTIVE SUMMARY:

The Harvester APT group has developed a new Linux version of its GoGra backdoor, which uses the legitimate Microsoft Graph API and Outlook mailboxes as a covert command-and-control channel to bypass traditional perimeter network defenses. This new malware is linked to a previously known Windows espionage campaign by Harvester due to similarities in code, demonstrating the threat actor's expansion of cross-platform capabilities.[/subscribe_to_unlock_form]

EXECUTIVE SUMMARY:

The Harvester APT group has developed a new Linux version of its GoGra backdoor, which uses the legitimate Microsoft Graph API and Outlook mailboxes as a covert command-and-control channel to bypass traditional perimeter network defenses. This new malware is linked to a previously known Windows espionage campaign by Harvester due to similarities in code, demonstrating the threat actor's expansion of cross-platform capabilities.[emaillocker id="1283"]

The malware uses social engineering lures to gain initial access to victim networks by deploying tailored decoy documents. The attackers actively masquerade malicious ELF files as standard document files by appending extensions like “. pdf”, with a subtle space between the filename and the extension to ensure that the file still executes as a Linux binary. This approach highlights a tailored approach that may be aimed at a specific regional demographic. The use of localized decoy documents suggests that the Harvester group is targeting specific regions, with initial VirusTotal submissions originating from India and Afghanistan.

Harvester is believed to be a nation-state-backed group that has been active for some time, using both custom malware and publicly available tools in its attacks. The group's use of Microsoft infrastructure for its command-and-control activity is a notable aspect of its operations. The Harvester group's expansion of its cross-platform capabilities and use of tailored approaches to target specific regions makes it a significant threat in the cybersecurity landscape.

THREAT PROFILE:

Tactic Technique Id Technique Sub-technique
Initial access T1566.002 Phishing Spearphishing Link
Defence Evasion T1036.005 Masquerading Match Legitimate Resource Name or Location
Command and control T1071.001 Application Layer Protocol Web Protocols
Command and control T1571 Non Standard Port -

MBC MAPPING:

Objective Behavior ID Behavior
Command & Control B0030 C2 Communication
Execution E1204 User Execution
Persistence F0012 Registry Run Keys / Startup Folder
Discovery E1082 System Information Discovery

REFERENCES:

The following reports contain further technical details:

https://thehackernews.com/2026/04/harvester-deploys-linux-gogra-backdoor.html

https://www.security.com/threat-intelligence/harvester-new-linux-backdoor-gogra

[/emaillocker]
crossmenu