In November 2023, a previously undocumented Go-based backdoor, named GoGra, targeted a media organization in South Asia, marking a significant development in the realm of cyber espionage. The attack, detailed in a report by Symantec, utilized the Microsoft Graph API to interact with a command-and-control (C&C) server hosted on Microsoft mail services. This innovative approach allowed the attackers to maintain a low profile and avoid the need for dedicated infrastructure, highlighting a growing trend among cyber espionage actors.
GoGra operates by reading messages from an Outlook username “FNU LNU” with subjects starting with “Input.” The message contents are decrypted using the AES-256 algorithm in Cipher Block Chaining (CBC) mode with a specific key. Once decrypted, the backdoor executes the commands via cmd.exe, and the results are then encrypted and sent back to the same user with the subject “Output.” This method ensures a continuous and covert communication channel between the attacker and the compromised system.
The attack has been attributed to the nation-state hacking group known as Harvester, based on its similarities to another custom implant named Graphon, which also utilizes the Graph API for C&C purposes. Harvester’s use of GoGra is part of a broader trend where threat actors exploit legitimate cloud services to stay under the radar. Other malware families, such as BLUELIGHT, Graphite, Graphican, and BirdyClient, have similarly leveraged cloud services for their operations, indicating a shift towards more sophisticated and stealthy attack vectors.
This incident underscores the need for organizations to bolster their cybersecurity measures, particularly in monitoring and securing cloud service interactions. The use of legitimate services like Microsoft Graph API by cyber attackers complicates detection efforts, requiring enhanced vigilance and advanced security protocols. As more threat actors adopt these techniques, it becomes crucial for cybersecurity defenses to evolve accordingly, ensuring robust protection against increasingly sophisticated cyber threats.
Reference: