China-Linked GopherWhisper APT Targets Mongolian Government via Slack, Discord
A China-linked advanced persistent threat (APT) group, dubbed GopherWhisper by ESET researchers, has been actively targeting the Mongolian government. The group, operational since at least November 2023, was first identified in January 2025 after a previously unknown backdoor surfaced on a Mongolian government institution’s network, according to The Record by Recorded Future.
What makes this campaign notable is GopherWhisper’s exfiltration strategy. The Record by Recorded Future highlights the group’s use of legitimate communication platforms like Slack and Discord for covert command-and-control (C2) and data egress. This tactic allows them to blend malicious traffic with legitimate network activity, making detection significantly harder for traditional security tools.
This isn’t just about Mongolia. It’s a clear signal that state-sponsored actors are increasingly leveraging mainstream collaboration tools to evade detection. For defenders, relying solely on perimeter defenses is a losing battle when attackers are operating within trusted applications.
What This Means For You
- If your organization uses Slack or Discord, you need to elevate your monitoring for anomalous activity within these platforms. Don't assume traffic to these legitimate services is benign. Review your security policies regarding unapproved third-party applications and ensure robust logging and behavioral analytics are in place for all collaboration tools. This means looking for unusual data transfers, suspicious user activity, and unapproved integrations.
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
GopherWhisper APT - Slack/Discord C2 Communication