New Linux Malware Abuses Microsoft Graph API for Covert Operations in South Asia

MRAdmin
By
2 Min Read

GoGra uses OAuth tokens to blend into normal Office 365 traffic, making detection difficult for signature based security tools.

Attack Campaign and Target Selection

A threat actor known as Harvester is actively deploying a Linux backdoor named GoGra across government and military networks in South Asia. The campaign focuses on espionage, leveraging a Go based implant that communicates with attacker infrastructure through the legitimate Microsoft Graph API. By blending malicious traffic with normal Office 365 activity, the malware evades traditional network monitoring tools and firewall rules.

Technical Mechanism and Persistence

GoGra establishes persistence on compromised Linux systems by masquerading as a systemd service or cron job. It uses OAuth 2.0 tokens to authenticate with Microsoft Graph, allowing it to read, write, and exfiltrate data from email and OneDrive accounts without raising alarms. The backdoor supports file uploads, command execution, and lateral movement, making it a versatile tool for long term access. No specific CVEs have been publicly associated with this campaign, as the attack relies on credential theft and social engineering rather than software vulnerabilities.

Impact and Defensive Recommendations

Organizations in the South Asian defense and diplomatic sectors should review logs for unusual API calls to graph.microsoft.com and monitor for unexpected service files in /etc/systemd/system. Network defenders can implement conditional access policies to restrict Graph API usage to known device IDs and enforce multi factor authentication for all service principals. The use of legitimate cloud APIs for command and control represents a growing trend that requires advanced behavioral detection rather than signature based tools.

Source: The Hacker News

Share This Article
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *