China-aligned threat actor is conducting widespread cyberespionage campaigns

A China-linked threat group which uses software updates to reroute traffic to malicious infrastructure has been mounting cyberespionage campaigns targeting victims in the U.S., Taiwan and elsewhere, according to new research.

The threat group PlushDaemon uses routers and other network device implants to redirect domain name system (DNS) queries to malicious external servers which take over updates to unleash tools used for cyberespionage, researchers at ESET revealed Wednesday.

The network implant, which ESET has dubbed EdgeStepper, sends traffic from infrastructure used for software updates to infrastructure controlled by attackers. The attackers then unleash the downloaders LittleDaemon and DaemonLogistics in the targeted devices. The downloaders deploy a backdoor toolkit which enables cyberespionage.

The attacks have been underway since 2019 with a Beijing university, a Taiwanese electronics manufacturer, a company in the automotive sector and a Japanese manufacturer among the targets, the researchers said in a blog post.

Attackers have used several popular Chinese software products to deploy the attacks, the researchers said.

PlushDaemon likely exploits software vulnerabilities or uses weak default administrative credentials to deploy EdgeStepper, the researchers said.

“EdgeStepper begins redirecting DNS queries to a malicious DNS node that verifies whether the domain in the DNS query message is related to software updates, and if so, it replies with the IP address of the hijacking node,” ESET researcher Facundo Muñoz said in a statement.

PlushDaemon has been active since at least 2018 and has historically conducted cyberespionage campaigns against individuals and entities located in the U.S. and the East Asia-Pacific, the researchers said.

In January, ESET revealed that PlushDaemon had been targeting users in East Asia by compromising a virtual private network (VPN) installer made by the South Korean company IPany to infect devices with malware.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

Next Post

Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

Related Posts

Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch

A critical security flaw has been disclosed in Apache Tika that could result in an XML external entity (XXE) injection attack. The vulnerability, tracked as CVE-2025-66516, is rated 10.0 on the CVSS scoring scale, indicating maximum severity. "Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an
Read More

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

A suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to steal victims' Microsoft 365 credentials and conduct account takeover attacks. The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare. The attacks involve using compromised email addresses belonging to government
Read More

Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails

A new agentic browser attack targeting Perplexity's Comet browser that's capable of turning a seemingly innocuous email into a destructive action that wipes a user's entire Google Drive contents, findings from Straiker STAR Labs show. The zero-click Google Drive Wiper technique hinges on connecting the browser to services like Gmail and Google Drive to automate routine tasks by granting them
Read More