- Content source
- https://cybersecuritynews.com/hackers-use-outlook-mailboxes/
Full Story:A nation-state-linked hacking group has found a clever way to hide its malicious activity inside Microsoft Outlook mailboxes, making its attacks much harder to detect by standard security tools.
The Harvester APT group, believed to be a nation-state-backed threat actor active since at least 2021, has developed a new Linux version of its GoGra backdoor.
This updated malware leverages the legitimate Microsoft Graph API and real Outlook mailboxes as a covert command-and-control (C2) channel.
By communicating through trusted Microsoft cloud infrastructure, the backdoor can bypass traditional perimeter network defenses that are not built to flag legitimate email traffic as suspicious.
The campaign appears to be focused on espionage rather than financial gain. Initial VirusTotal submissions for the malware samples originated from India and Afghanistan, suggesting that organizations and individuals in South Asia remain the primary targets.
The attackers also used localized decoy documents that reference familiar cultural names and services in the region, which indicates a deliberate and tailored targeting strategy. Historically, Harvester has focused its espionage activities in South Asia, and this campaign is consistent with that pattern.
Hackers Use Outlook Mailboxes to Hide Linux GoGra Backdoor Communications
Harvester APT hides GoGra backdoor traffic in Microsoft Outlook via Graph API, masking C2 inside legitimate mailboxes.
cybersecuritynews.com