DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home News

ESET Discovers Chinese PlushDaemon Group Compromises Network Devices

DigitalCIO Bureau by DigitalCIO Bureau
November 24, 2025
in News
0
ESET Discovers Chinese PlushDaemon Group Compromises Network Devices
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

ESET researchers discovered that China-aligned threat group PlushDaemon performs adversary-in-the-middle attacks using a previously undocumented implant for network devices (e.g., a router) that ESET named EdgeStepper, which redirects all DNS queries to a malicious external DNS server that replies with the address of another node that performs the hijacking of updates.

Effectively rerouting software updates traffic to attacker-controlled infrastructure with the aim of deploying the downloaders LittleDaemon and DaemonicLogistics in targeted machines and to ultimately distribute the SlowStepper implant. SlowStepper is a backdoor toolkit with dozens of components used for cyberespionage. These implants give PlushDaemon the capability to compromise targets anywhere in the world.

Since 2019, this China-aligned group has deployed attacks in the United States, New Zealand, Cambodia, Hong Kong, Taiwan, and mainland China itself. Among their victims were a university in Beijing, a Taiwanese company that manufactures electronics, a company in the automotive sector, and a branch of a Japanese company in the manufacturing sector.

In the discovered attack scenario, PlushDaemon first compromises a network device to which their target might connect; the compromise is probably achieved by exploiting a vulnerability in the software running on the device or through weak and/or well-known default administrative credentials, enabling the attackers to deploy EdgeStepper (and possibly other tools).

“Then, EdgeStepper begins redirecting DNS queries to a malicious DNS node that verifies whether the domain in the DNS query message is related to software updates, and if so, it replies with the IP address of the hijacking node. Alternatively, we have also observed that some servers are both the DNS node and the hijacking node; in those cases, the DNS node replies to DNS queries with its own IP address,” says ESET researcher Facundo Muñoz, who discovered and analyzed the attack. “Several popular Chinese software products had their updates hijacked by PlushDaemon via EdgeStepper,” he adds.

PlushDaemon is a China-aligned threat actor active since at least 2018 that engages in espionage operations against individuals and entities in East Asia-Pacific and the United States. It uses a custom backdoor that ESET tracks as SlowStepper. In the past, ESET Research has observed the group gaining access via vulnerabilities in web servers, and in 2023 it performed a supply-chain attack.

 

Tags: ESET
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Okta Names Mathew Graham as Chief Security Officer for Asia Pacific

by DigitalCIO Bureau
September 2, 2025
0
Okta Names Mathew Graham as Chief Security Officer for Asia Pacific

Okta has appointed experienced security executive Mathew Graham as its Chief Security Officer (CSO) for the Asia-Pacific region. Graham will be responsible for driving Okta’s regional security strategy,...

Read moreDetails

Okta Acquires Axiom Security

by DigitalCIO Bureau
August 27, 2025
0
CRISIL To Acquire Bridge To India Energy

Okta has signed a definitive agreement to acquire Axiom Security, a modern, identity-centric Privileged Access Management (PAM) solution built for cloud, SaaS, and database environments. Axiom’s technology will...

Read moreDetails

SonicWall Appoints Michael Crean As General Manager of Its Managed Security Services Division

by DigitalCIO Bureau
August 27, 2025
0
SonicWall Appoints Michael Crean As General Manager of Its Managed Security Services Division

SonicWall today announced another step in its transformation to become the cybersecurity platform purpose-built for Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs) and the customers they...

Read moreDetails

C5i And Databricks Launch Marketing Data Cloud

by DigitalCIO Bureau
August 19, 2025
0
More Than 50% of CDAOs Will Secure Funding for Data Literacy and AI Literacy Programs by 2027

C5i, a pure-play AI and analytics company, has announced the expansion of its partnership with Databricks with the launch of its Marketing Data Cloud (MDC), a validated Built...

Read moreDetails

Palo Alto Networks Acquires CyberArk For $25 Billion

by DigitalCIO Bureau
July 31, 2025
0
Check Point Acquires SASE Security Firm Perimeter 81

Palo Alto Networks and CyberArk have announced that they have entered into a definitive agreement under which Palo Alto Networks will acquire CyberArk. Under the terms of the...

Read moreDetails
Next Post
 Cloudera Announces Updates to its Platform

 Cloudera Announces Updates to its Platform

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Sophos MDR Protects 26,000 Organisations Globally

Sophos MDR Protects 26,000 Organisations Globally

January 10, 2025
Tata Elxsi and Emerson Inaugurate the Mobility Innovation Centre in Bengaluru

Tata Elxsi and Emerson Inaugurate the Mobility Innovation Centre in Bengaluru

July 12, 2024
Dell and Red Hat forge AI collaboration

Dell and Red Hat forge AI collaboration

September 9, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?