Network devices compromised for adversary-in-the-middle attacks
China-aligned threat actor PlushDaemon has been conducting espionage operations since 2018, targeting entities in China, Taiwan, Hong Kong, Cambodia, South Korea, the United States, and New Zealand. The group employs a custom backdoor called SlowStepper and uses a network implant named EdgeStepper to hijack legitimate updates. EdgeStepper redirects DNS queries to a malicious node, rerouting traffic from legitimate infrastructure to attacker-controlled servers. The group has also exploited web server vulnerabilities and performed a supply-chain attack. PlushDaemon's adversary-in-the-middle technique involves compromising network devices, deploying EdgeStepper, and using it to redirect DNS queries for software updates to malicious nodes. This allows them to serve malicious updates containing the LittleDaemon downloader, which then deploys the SlowStepper implant.
Pulse ID: 691e322b7508a5264ba48186
Pulse Link: https://otx.alienvault.com/pulse/691e322b7508a5264ba48186
Pulse Author: AlienVault
Created: 2025-11-19 21:09:59
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#AdversaryInTheMiddle #BackDoor #Cambodia #China #CyberSecurity #DNS #Edge #Espionage #HongKong #InfoSec #Korea #OTX #OpenThreatExchange #RAT #SouthKorea #Troll #UnitedStates #bot #AlienVault