NY16:31
    LDN21:31
    HKG04:31
    TYO05:31
    Gold4,530-0.13%
    Bitcoin77,623+0.09%
    Gold4,530-0.1%
    Bitcoin77,623+0.1%
    LATEST NEWS
    Everest's Deadly Peak: Record Fatalities Mountabout 2 hoursEbola Surges as US Health Funding Dries Upabout 2 hoursHigh Court Reshapes Voting Rights Enforcementabout 2 hoursIran Asserts Broader Control Over Hormuz Straitabout 2 hoursHormuz Oil Flows Face Five-Year Recovery Lagabout 2 hoursNagelsmann confirms Neuer as Germany’s World Cup number one after retirement U-turnabout 3 hoursTurkish Court Ousts CHP Leader, Shaking Marketsabout 4 hoursGoldman Sachs Spearheads SpaceX Public Offeringabout 4 hoursNeymar expected fit for 2026 World Cup after minor calf scareabout 4 hoursNFC East offseason: Cowboys, Giants, Eagles and Commanders fortify rosters for 2026about 4 hoursColts owner Carlie Irsay-Gordon steps into public role after late-season collapseabout 5 hoursDerrick Henry’s durability steadies Ravens backfield entering 2026about 6 hoursIran Boosts Enriched Uranium Stockpileabout 6 hoursTaiwan President Signals Openness to Trump Talksabout 7 hoursEbola Crisis Deepens as US Funding Dries Upabout 7 hoursEverest's Deadly Peak: Record Fatalities Mountabout 2 hoursEbola Surges as US Health Funding Dries Upabout 2 hoursHigh Court Reshapes Voting Rights Enforcementabout 2 hoursIran Asserts Broader Control Over Hormuz Straitabout 2 hoursHormuz Oil Flows Face Five-Year Recovery Lagabout 2 hoursNagelsmann confirms Neuer as Germany’s World Cup number one after retirement U-turnabout 3 hoursTurkish Court Ousts CHP Leader, Shaking Marketsabout 4 hoursGoldman Sachs Spearheads SpaceX Public Offeringabout 4 hoursNeymar expected fit for 2026 World Cup after minor calf scareabout 4 hoursNFC East offseason: Cowboys, Giants, Eagles and Commanders fortify rosters for 2026about 4 hoursColts owner Carlie Irsay-Gordon steps into public role after late-season collapseabout 5 hoursDerrick Henry’s durability steadies Ravens backfield entering 2026about 6 hoursIran Boosts Enriched Uranium Stockpileabout 6 hoursTaiwan President Signals Openness to Trump Talksabout 7 hoursEbola Crisis Deepens as US Funding Dries Upabout 7 hours
    Global Affairs

    Mongolian government hit by LaxGopher cyber espionage

    Mongolian government systems were compromised by a new LaxGopher backdoor active since at least November 2023, investigators said.

    Published28 Apr 2026, 00:54:38
    Mongolian government hit by LaxGopher cyber espionage
    A360
    Key Takeaways✦ Atlas AI
    01

    A new cyber espionage group, active since November 2023, breached a Mongolian government entity, deploying a novel backdoor called LaxGopher to exfiltrate data and maintain persistent access.

    02

    The attackers leveraged common communication platforms like Discord and Slack for command and control, a tactic that significantly complicates detection and attribution due to their legitimate use.

    03

    The use of custom Go-based tools for various malicious functions and a dedicated exfiltration tool highlights the sophisticated and targeted nature of this state-linked cyber espionage operation.

    Atlas AI

    Atlas AI

    A previously unidentified cyber threat actor has compromised a Mongolian government entity in an operation investigators said has been active since at least November 2023. The intrusion involved a newly identified backdoor, called LaxGopher, and a set of custom tools designed to keep long-term access while moving data out of the network.

    Investigators found LaxGopher installed on about a dozen systems inside the affected government institution. They said the malware enabled data exfiltration and helped the attackers maintain persistent access, indicating an operation focused on ongoing collection rather than short-term disruption.

    LaxGopher backdoor found on about a dozen systems

    According to investigators, LaxGopher functioned as a backdoor that supported both continued presence and the removal of information from the compromised environment. The discovery of the tool on roughly 12 systems suggests the actor established multiple footholds within the institution.

    ATLAS SIGNALCybersecurityHigh1–3 months
    23d

    Rise of New State-Sponsored Cyber Espionage Tools Targets Government Systems

    The discovery of the previously unidentified LaxGopher backdoor targeting the Mongolian government since November 2023 highlights the continuous development and deployment of new, sophisticated tools by state-sponsored actors to conduct cyber espionage against national governments. This trend underscores an escalating international cybersecurity threat landscape, where nations constantly face evolving methods of data exfiltration and persistent network intrusion.

    1 story
    View Issue

    The attackers also relied on custom tooling, with investigators noting that the tools were primarily written in Go. These tools were used for tasks including loading, injecting, and backdooring systems, pointing to a tailored toolkit built to support the campaign’s objectives.

    Discord, Slack, and Microsoft 365 Outlook used for control

    Investigators said the group used widely available communication platforms for command and control, including Discord, Slack, and Microsoft 365 Outlook. Using legitimate services in this way can allow malicious traffic to blend into normal activity, making suspicious behavior harder to spot in routine monitoring.

    They said the operation used a dedicated exfiltration tool to move stolen information out of the network. The data was compressed and then uploaded to a file-sharing service, a workflow that can reduce transfer size and help standardize how information is staged before being sent out.

    Tactics align with cyber espionage, attribution remains difficult

    Investigators assessed that the tactics, techniques, and procedures observed in the intrusion are consistent with cyber espionage. The focus on persistence, the use of a backdoor, and the structured approach to data theft were cited as indicators of an intelligence-gathering effort.

    At the same time, investigators said the use of legitimate services for covert communications complicates both detection and attribution. Because these platforms are commonly used in normal work environments, separating malicious control traffic from routine activity can be challenging, and linking the operation to a specific sponsor may remain uncertain based on the available details.

    Share

    Related Articles

    Atlas360

    Sign up for Atlas Daily

    The daily global news briefing you can trust.

    every weekday·Read it now

    or
    Sign in

    Already subscribed? Sign in and we won't show you this message again.