#ESETresearch discovered and named πŸ‡¨πŸ‡³ China-aligned #APT group #PlushDaemon who did a supply-chain compromise of a πŸ‡°πŸ‡· South Korean #VPN provider, trojanizing its legitimate software installer with a Windows backdoor we named #SlowStepper.

https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-supply-chain-korean-vpn-service/

The website had been compromised by PlushDaemon since at least November 2023, resulting in users from πŸ‡°πŸ‡· South Korea, πŸ‡¨πŸ‡³ China, and πŸ‡―πŸ‡΅ Japan downloading the trojanized installer, which deployed the legitimate software and SlowStepper.

The installer deploys malicious files that contain several components inside a custom-formatted archive , including loaders, a process monitor , legitimate PE files abused for side-loading, and the SlowStepper backdoor.

SlowStepper has several interesting features such as decoding #DNS TXT records of a malicious domain to obtain its C&C servers, and a 🐚 shell mode with custom commands, one of which executes modules of an extensive toolkit stored at the Chinese code repository #gitcode

We presented about #PlushDaemon at #jpcert_ac on January 22, 2025 at https://jsac.jpcert.or.jp/

IoCs available in our GitHub repository at https://github.com/eset/malware-ioc/tree/master/PlushDaemon

PlushDaemon compromises supply chain of Korean VPN service

ESET researchers uncover a supply-chain attack against a VPN provider in South Korea by a new China-aligned APT group we have named PlushDaemon.