← Back to Tech & Science

State-Backed Harvester Group Deploys New Linux Malware in South Asia

Tech & ScienceAI-Generated & Algorithmically Scored··2 UPDATES

AI-generated from multiple sources. Verify before acting on this reporting.

Update

NEW DELHI (AP) — Additional corroborating reports have emerged regarding the Harvester group's deployment of the new Linux GoGra backdoor malware in South Asia. These fresh accounts confirm the scope and technical details of the campaign initially detected on April 22, 2026. The new information reinforces the assessment that the state-backed espionage group is actively targeting telecommunications, government, and information technology organizations across the region. The reports align with previous findings regarding the malware's utilization of the Microsoft Graph API for command and control operations. This development underscores the expanding capabilities of the group into Linux-based environments. No new targets or geographic regions have been identified at this time. Security researchers continue to monitor the situation for further developments.

Update

NEW DELHI (AP) — Additional corroborating reports have confirmed the deployment of the GoGra backdoor malware variant by the state-backed Harvester group. The new information reinforces the initial findings regarding the campaign targeting telecommunications, government, and information technology organizations across South Asia. The expanded intelligence indicates a broader scope of the operation than previously understood, with further evidence pointing to the group's sustained activity within Linux-based environments. The malware continues to utilize the Microsoft Graph API for command and control operations, maintaining the same technical characteristics identified in the initial detection. Security teams are advised to remain vigilant as the campaign appears to be ongoing, with no indication of a reduction in the group's operational tempo. The additional reports provide further context on the scale and reach of the espionage effort, highlighting the need for continued monitoring of affected sectors in the region. Authorities are working to assess the full impact of the intrusion and to implement necessary countermeasures to protect critical infrastructure.

Original Report —

NEW DELHI (AP) — A state-backed espionage group known as Harvester has deployed a new Linux variant of the GoGra backdoor malware, targeting telecommunications, government, and information technology organizations across South Asia. The campaign, detected on April 22, 2026, marks a significant expansion of the group's capabilities into Linux-based environments, utilizing the Microsoft Graph API for command and control operations.

The malware, identified by cybersecurity researchers as a sophisticated evolution of the GoGra backdoor, is designed to infiltrate networks and exfiltrate sensitive data. Unlike previous iterations that primarily targeted Windows systems, this new variant is specifically engineered to operate on Linux servers, which are widely used in critical infrastructure and enterprise environments. The group leverages the Microsoft Graph API to establish communication channels, allowing for remote command execution and data retrieval without triggering traditional network-based security alerts.

Harvester, a threat actor linked to state-sponsored activities, has a history of targeting strategic sectors. The current campaign focuses on high-value targets in South Asia, including national telecommunications providers, government agencies, and IT service firms. The timing of the deployment coincides with increased geopolitical tensions in the region, raising concerns about the potential for data theft and long-term network compromise.

Security experts note that the use of the Microsoft Graph API represents a shift in tactics, as it allows the malware to blend legitimate cloud traffic with malicious commands. This technique complicates detection efforts, as the communication appears to originate from authorized cloud services. The malware's ability to execute commands remotely and maintain persistence within Linux systems poses a significant risk to the integrity of targeted networks.

The affected organizations have not publicly disclosed the extent of the breach, but industry analysts warn that the sophistication of the attack suggests a well-resourced adversary with advanced capabilities. The deployment of the Linux variant indicates that Harvester is adapting its tools to target diverse operating systems, expanding its reach beyond traditional Windows-centric environments.

Cybersecurity firms are urging organizations in South Asia to audit their Linux systems and monitor for unauthorized access to Microsoft Graph API endpoints. The incident highlights the growing threat of state-sponsored espionage targeting critical infrastructure and the need for enhanced defensive measures against evolving malware variants.

As of now, it remains unclear whether the malware has successfully exfiltrated data from targeted organizations or if the campaign is in its early stages. The full scope of the compromise and the specific objectives of Harvester in this operation are still being assessed by security researchers and government agencies in the region.