#PlushDaemon #EdgeStepper #LittleDaemon #DaemonicLogistics #SlowStepper
https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/
π¨ PlushDaemon, a China-linked APT targeting S. Korea with a SlowStepper backdoor, SlowStepper. Using a supply chain attack, it infiltrates #VPN software to steal sensitive data.
Read: https://hackread.com/chinese-plushdaemon-apt-south-korean-vpn-backdoor/
#ESETresearch discovered and named π¨π³ China-aligned #APT group #PlushDaemon who did a supply-chain compromise of a π°π· South Korean #VPN provider, trojanizing its legitimate software installer with a Windows backdoor we named #SlowStepper.
The website had been compromised by PlushDaemon since at least November 2023, resulting in users from π°π· South Korea, π¨π³ China, and π―π΅ Japan downloading the trojanized installer, which deployed the legitimate software and SlowStepper.
The installer deploys malicious files that contain several components inside a custom-formatted archive , including loaders, a process monitor , legitimate PE files abused for side-loading, and the SlowStepper backdoor.
SlowStepper has several interesting features such as decoding #DNS TXT records of a malicious domain to obtain its C&C servers, and a π shell mode with custom commands, one of which executes modules of an extensive toolkit stored at the Chinese code repository #gitcode
We presented about #PlushDaemon at #jpcert_ac on January 22, 2025 at https://jsac.jpcert.or.jp/
IoCs available in our GitHub repository at https://github.com/eset/malware-ioc/tree/master/PlushDaemon