PlushDaemon Hijacks Software Updates in Supply-Chain Attacks
Summary
Hide ▲
Show ▼
The China-linked threat actor PlushDaemon has been hijacking software update traffic using a new implant called EdgeStepper in cyberespionage operations since 2018. The group targets individuals and organizations in the U.S., China, Taiwan, Hong Kong, South Korea, New Zealand, and Cambodia, deploying custom malware like the SlowStepper backdoor. The attackers compromise routers via known vulnerabilities or weak passwords, install EdgeStepper to redirect update traffic, and deliver the LittleDaemon malware downloader. This leads to the deployment of the SlowStepper backdoor, which enables extensive system control and data theft. EdgeStepper is a Go-based network backdoor that redirects all DNS queries to a malicious hijacking node, facilitating adversary-in-the-middle (AitM) attacks. In May 2024, PlushDaemon targeted a South Korean VPN provider named IPany. The group uses an ELF file named bioset, internally called dns_cheat_v2, to forward DNS traffic to a malicious DNS node. They deploy two downloaders, LittleDaemon and DaemonLogistics, which deliver a backdoor toolkit for cyber espionage operations.
Timeline
-
19.11.2025 12:00 3 articles · 1d ago
PlushDaemon Hijacks Software Updates with EdgeStepper Implant
Since 2018, PlushDaemon has targeted organizations in multiple countries using a new implant called EdgeStepper to hijack software update traffic. The group installs EdgeStepper on compromised routers, redirects update traffic, and delivers the LittleDaemon downloader, which deploys the SlowStepper backdoor for extensive system control and data theft. EdgeStepper is a Go-based network backdoor that redirects all DNS queries to a malicious hijacking node, facilitating adversary-in-the-middle (AitM) attacks. The attackers have targeted entities in Cambodia, including a company in the automotive sector and a branch of a Japanese company in the manufacturing sector. In May 2024, PlushDaemon targeted a South Korean VPN provider named IPany. The group uses an ELF file named bioset, internally called dns_cheat_v2, to forward DNS traffic to a malicious DNS node. They deploy two downloaders, LittleDaemon and DaemonLogistics, which deliver a backdoor toolkit for cyber espionage operations.
Show sources
- ‘PlushDaemon’ hackers hijack software updates in supply-chain attacks — www.bleepingcomputer.com — 19.11.2025 12:00
- EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates — thehackernews.com — 19.11.2025 12:00
- PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns — www.infosecurity-magazine.com — 19.11.2025 14:00
Information Snippets
-
PlushDaemon has targeted electronics manufacturers, universities, and a Japanese automotive plant in Cambodia.
First reported: 19.11.2025 12:003 sources, 3 articlesShow sources
- ‘PlushDaemon’ hackers hijack software updates in supply-chain attacks — www.bleepingcomputer.com — 19.11.2025 12:00
- EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates — thehackernews.com — 19.11.2025 12:00
- PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns — www.infosecurity-magazine.com — 19.11.2025 14:00
-
EdgeStepper intercepts DNS queries and redirects software-update traffic to malicious infrastructure.
First reported: 19.11.2025 12:003 sources, 3 articlesShow sources
- ‘PlushDaemon’ hackers hijack software updates in supply-chain attacks — www.bleepingcomputer.com — 19.11.2025 12:00
- EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates — thehackernews.com — 19.11.2025 12:00
- PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns — www.infosecurity-magazine.com — 19.11.2025 14:00
-
LittleDaemon malware is disguised as a DLL file named 'popup_4.2.0.2246.dll' and fetches the DaemonicLogistics dropper.
First reported: 19.11.2025 12:003 sources, 3 articlesShow sources
- ‘PlushDaemon’ hackers hijack software updates in supply-chain attacks — www.bleepingcomputer.com — 19.11.2025 12:00
- EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates — thehackernews.com — 19.11.2025 12:00
- PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns — www.infosecurity-magazine.com — 19.11.2025 14:00
-
SlowStepper backdoor allows system information collection, file operations, command execution, and data theft via spyware tools.
First reported: 19.11.2025 12:002 sources, 2 articlesShow sources
- ‘PlushDaemon’ hackers hijack software updates in supply-chain attacks — www.bleepingcomputer.com — 19.11.2025 12:00
- EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates — thehackernews.com — 19.11.2025 12:00
-
EdgeStepper is a Go-based network backdoor used by PlushDaemon.
First reported: 19.11.2025 12:001 source, 1 articleShow sources
- EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates — thehackernews.com — 19.11.2025 12:00
-
EdgeStepper redirects all DNS queries to a malicious hijacking node.
First reported: 19.11.2025 12:001 source, 1 articleShow sources
- EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates — thehackernews.com — 19.11.2025 12:00
-
PlushDaemon has targeted a South Korean VPN provider named IPany.
First reported: 19.11.2025 12:002 sources, 2 articlesShow sources
- EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates — thehackernews.com — 19.11.2025 12:00
- PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns — www.infosecurity-magazine.com — 19.11.2025 14:00
-
PlushDaemon has targeted entities in Cambodia, including a company in the automotive sector and a branch of a Japanese company in the manufacturing sector.
First reported: 19.11.2025 12:001 source, 1 articleShow sources
- EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates — thehackernews.com — 19.11.2025 12:00
-
EdgeStepper consists of a Distributor module and a Ruler component.
First reported: 19.11.2025 12:002 sources, 2 articlesShow sources
- EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates — thehackernews.com — 19.11.2025 12:00
- PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns — www.infosecurity-magazine.com — 19.11.2025 14:00
-
EdgeStepper hijacks update channels for Chinese software like Sogou Pinyin.
First reported: 19.11.2025 12:001 source, 1 articleShow sources
- EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates — thehackernews.com — 19.11.2025 12:00
-
PlushDaemon has targeted a South Korean VPN provider named IPany in May 2024.
First reported: 19.11.2025 14:001 source, 1 articleShow sources
- PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns — www.infosecurity-magazine.com — 19.11.2025 14:00
-
PlushDaemon uses an ELF file named bioset, internally called dns_cheat_v2, to forward DNS traffic to a malicious DNS node.
First reported: 19.11.2025 14:001 source, 1 articleShow sources
- PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns — www.infosecurity-magazine.com — 19.11.2025 14:00
-
PlushDaemon deploys two downloaders, LittleDaemon and DaemonLogistics, which deliver a backdoor toolkit for cyber espionage operations.
First reported: 19.11.2025 14:001 source, 1 articleShow sources
- PlushDaemon Hackers Unleash New Malware in China-Aligned Spy Campaigns — www.infosecurity-magazine.com — 19.11.2025 14:00
Similar Happenings
Flax Typhoon APT Group Exploits ArcGIS for Persistent Access
The Flax Typhoon APT group, also tracked as Ethereal Panda and RedJuliett, exploited a legitimate ArcGIS application to establish a persistent backdoor for over a year. The attack involved modifying the ArcGIS server’s Java server object extension (SOE) to function as a web shell, enabling command execution, lateral movement, and data exfiltration. The malicious SOE persisted even after remediation and patching, highlighting the need for proactive threat hunting and treating all public-facing applications as high-risk assets. The group targeted a public-facing ArcGIS server connected to an internal server, compromising a portal administrator account and deploying a malicious SOE. They used a base64-encoded payload and a hardcoded key to execute commands and upload a renamed SoftEther VPN executable for long-term access. The attack targeted IT staff workstations within the scanned subnet, demonstrating the potential for significant operational disruption and data exposure. The attackers used a public-facing ArcGIS server connected to a private, internal ArcGIS server for backend computations, a common default configuration. They sent disguised commands to the portal server, creating a hidden system directory that became Flax Typhoon's private workspace. The attackers ensured the compromised component was included in system backups, turning the organization's own recovery plan into a guaranteed method of reinfection. ReliaQuest worked with the customer organization and Esri to fully evict Flax Typhoon actors from the environment, which included rebuilding the entire server stack and deploying custom detections for the threat activity. ReliaQuest urged organizations to treat all public-facing applications as high-risk assets and recommended security teams audit and harden such applications. The researchers also highlighted the need for behavioral analytics to complement signature-based detection, as Flax Typhoon did not use any malware or known malicious files. Strong credential hygiene was emphasized, noting that a weak administrator password gave the attackers a foothold in the organization's network. ReliaQuest recommended implementing multifactor authentication and practicing the principle of least privilege to enhance security. The ArcGIS geographic information system (GIS) is developed by Esri and supports server object extensions (SOE) that can extend basic functionality. The software is used by municipalities, utilities, and infrastructure operators to manage spatial and geographic data through maps. Researchers at cybersecurity company ReliaQuest have moderate confidence that the threat actor is Flax Typhoon. The attackers used valid administrator credentials to log into a public-facing ArcGIS server linked to a private, internal ArcGIS server. The malicious SOE accepted base64-encoded commands through a REST API parameter (layer) and executed them on the internal ArcGIS server. The exchange was protected by a hardcoded secret key, ensuring only the attackers had access to this backdoor. The attackers downloaded and installed SoftEther VPN Bridge, registering it as a Windows service that started automatically. The VPN established an outbound HTTPS tunnel to the attacker's server at 172.86.113[.]142, linking the victim's internal network to the threat actor's machine. The VPN used normal HTTPS traffic on port 443, blending with legitimate traffic, and remained active even if the SOE was detected and deleted. The attackers scanned the local network, moved laterally, accessed internal hosts, dumped credentials, or exfiltrated data using the VPN connection. The attackers targeted two workstations belonging to the target organization's IT staff, attempting to dump the Security Account Manager (SAM) database, security registry keys, and LSA secrets. Flax Typhoon is known for espionage campaigns to establish long-term, stealthy access through legitimate software. The FBI linked Flax Typhoon to the massive "Raptor Train" botnet, impacting the U.S. The Treasury's Office of Foreign Assets Control (OFAC) sanctioned companies that supported the state-sponsored hackers. Esri confirmed this is the first time an SOE has been used this way and will update their documentation to warn users of the risk of malicious SOEs. The attackers used the JavaSimpleRESTSOE ArcGIS extension to invoke a REST operation to run commands on the internal server via the public portal. The attackers specifically targeted two workstations belonging to IT personnel to obtain credentials and further burrow into the network. The attackers reset the password of the administrative account.
Increased Scanning for PAN-OS GlobalProtect Vulnerability
SANS Internet Storm Center has observed a significant rise in internet-wide scans targeting the critical PAN-OS GlobalProtect vulnerability (CVE-2024-3400). This flaw, disclosed last year, allows unauthenticated attackers to execute arbitrary code with root privileges on affected firewalls. The scans involve attempts to upload and retrieve files, indicating potential pre-exploit staging activities. The vulnerability is a command injection flaw that can be exploited to gain unauthorized access and control over vulnerable firewalls. This development underscores the ongoing threat posed by unpatched systems and the importance of timely security updates. The scans are part of a broader trend of increased cyber activity targeting critical infrastructure and enterprise networks.
Phantom Taurus Targets Government and Telecommunications Organizations
Government and telecommunications organizations in Africa, the Middle East, and Asia have been targeted by a China-aligned nation-state actor known as Phantom Taurus over the past two-and-a-half years. The group focuses on espionage, targeting ministries of foreign affairs, embassies, geopolitical events, and military operations. Phantom Taurus employs custom-developed tools and techniques, including a bespoke malware suite named NET-STAR, to maintain long-term intelligence collection and obtain confidential data from targets of strategic interest to China. The group's activities coincide with major global events and regional security affairs, demonstrating stealth, persistence, and adaptability in their tactics, techniques, and procedures (TTPs). Phantom Taurus has been observed using a .NET malware suite named NET-STAR to breach IIS web servers, which operates almost entirely in memory and includes a fileless backdoor that establishes encrypted command-and-control (C2) sessions. The suite includes a backdoor named IIServerCore that accepts commands and encoded .NET payloads, enabling arbitrary code execution on compromised systems. The suite also includes two AssemblyExecuter loaders (v1 and v2) that allow dynamic loading of additional .NET malware, with v2 featuring advanced evasion techniques such as AMSI and ETW bypass. The group uses custom SQL queries to search for specific tables and keywords on compromised systems, exporting all matching results. Additionally, Phantom Taurus's operational methods are supported by other custom malware, including TunnelSpecter and SweetSpecter, which are used for email exfiltration.
Brickstorm Malware Used in Long-Term Espionage Against U.S. Organizations
The UNC5221 activity cluster, attributed to suspected Chinese hackers, has been using the BRICKSTORM malware in long-term espionage operations against U.S. organizations in the technology, legal, SaaS, and BPO sectors. The malware, a Go-based backdoor, has been active for over a year, with an average dwell time of 393 days. It has been used to steal data from various sectors, including SaaS providers and BPOs. The attackers exploit vulnerabilities in edge devices and use anti-forensics techniques to avoid detection. The malware serves multiple functions, including web server, file manipulation, dropper, SOCKS relay, and shell command execution. It targets appliances without EDR support, such as VMware vCenter/ESXi, and uses legitimate traffic to mask its C2 communications. The attackers aim to exfiltrate emails and maintain stealth through various tactics, including removing the malware post-operation to hinder forensic investigations. The attackers use a malicious Java Servlet Filter (BRICKSTEAL) on vCenter to capture credentials, and clone Windows Server VMs to extract secrets. The stolen credentials are used for lateral movement and persistence, including enabling SSH on ESXi and modifying startup scripts. The malware exfiltrates emails via Microsoft Entra ID Enterprise Apps, utilizing its SOCKS proxy to tunnel into internal systems and code repositories. UNC5221 focuses on developers, administrators, and individuals tied to China's economic and security interests. Mandiant has released a free scanner script to help defenders detect BRICKSTORM. The BRICKSTORM backdoor is under active development, with a variant featuring a delay timer for C2 communication. The attackers have exploited Ivanti Connect Secure zero-day vulnerabilities (CVE-2023-46805 and CVE-2024-21887) for initial access. The attackers have used a custom dropper to install a malicious Java Servlet filter (BRICKSTEAL) in memory, avoiding detection. The attackers have modified init.d, rc.local, or systemd files to ensure persistence on appliances. The attackers have targeted Windows environments in Europe since at least November 2022. The attackers have been linked to other related Chinese threat actors besides UNC5221. The campaign has been monitored by Mandiant since March 2025. The attackers have targeted downstream customers of compromised SaaS providers. The attackers are believed to be analyzing stolen source code to identify zero-day vulnerabilities in enterprise technologies. The attackers use a delay timer to lie dormant on infected systems until a hard-coded date. The malware employs Garble, an open-source tool, for code obfuscation to hide function names, structures, and logic. Brickstorm has been found on VMware vCenter and ESXi hosts, often deployed prior to pivoting to these systems. The attackers use legitimate cloud services like Cloudflare Workers or Heroku for C2 communications. The attackers use dynamic domains like sslip.io or nip.io that point directly to the C2 server’s IP. The attackers favor appliance and management-plane compromise, per-victim obfuscated Go binaries, delayed-start implants, and Web/DoH C2 to preserve stealth. The attackers harvest and use valid high-privilege credentials to appear as routine administrator tasks. The attackers deploy in-memory servlet filters, remove installer artifacts, and embed delayed-start logic to limit forensic traces. The attackers abuse virtualization management capabilities, such as cloning VMs to extract credential stores offline. The attackers deploy an in-memory Java Servlet filter on vCenter to intercept and decode web authentication to harvest high-privilege credentials. The attackers use a SOCKS proxy on compromised appliances to tunnel into internal networks for interactive access and file retrieval. F5 disclosed that unidentified threat actors stole files containing BIG-IP's source code and information related to undisclosed vulnerabilities. The attackers used the BRICKSTORM malware, attributed to a China-nexus espionage group dubbed UNC5221. The attackers were in F5's network for at least 12 months before detection. GreyNoise observed elevated scanning activity targeting BIG-IP in three waves on September 23, October 14, and October 15, 2025. Censys identified over 680,000 F5 BIG-IP load balancers and application gateways visible on the public internet. The attackers used a delay timer to lie dormant on infected systems until a hard-coded date. The malware employs Garble, an open-source tool, for code obfuscation to hide function names, structures, and logic. Brickstorm has been found on VMware vCenter and ESXi hosts, often deployed prior to pivoting to these systems. The attackers use legitimate cloud services like Cloudflare Workers or Heroku for C2 communications. The attackers use dynamic domains like sslip.io or nip.io that point directly to the C2 server’s IP. The attackers favor appliance and management-plane compromise, per-victim obfuscated Go binaries, delayed-start implants, and Web/DoH C2 to preserve stealth. The attackers harvest and use valid high-privilege credentials to appear as routine administrator tasks. The attackers deploy in-memory servlet filters, remove installer artifacts, and embed delayed-start logic to limit forensic traces. The attackers abuse virtualization management capabilities, such as cloning VMs to extract credential stores offline. The attackers deploy an in-memory Java Servlet filter on vCenter to intercept and decode web authentication to harvest high-privilege credentials. The attackers use a SOCKS proxy on compromised appliances to tunnel into internal networks for interactive access and file retrieval.
MostereRAT Malware Campaign Targets Japanese Windows Users
A new malware campaign using MostereRAT, a banking malware-turned-RAT, targets Japanese Windows users. The malware employs sophisticated evasion techniques, including the use of an obscure programming language and disabling of security tools, to maintain long-term access and control over compromised systems. The campaign begins with phishing emails that lure victims into downloading a malicious Word document. Once installed, MostereRAT deploys multiple modules to achieve persistence, privilege escalation, and remote access. The malware is designed to evade detection and disable various antivirus and endpoint detection and response (EDR) products, making it difficult for defenders to detect and mitigate the threat. The primary goal of MostereRAT is to maintain persistent control over compromised systems, maximize the utility of victim resources, and retain ongoing access to valuable data. The malware uses mutual TLS (mTLS) to secure command-and-control (C2) communications and can monitor foreground window activity associated with Qianniu - Alibaba's Seller Tool. It can also perform Early Bird Injection to inject an EXE into svchost.exe.