China-aligned threat actor is conducting widespread cyberespionage campaigns

A China-linked threat group which uses software updates to reroute traffic to malicious infrastructure has been mounting cyberespionage campaigns targeting victims in the U.S., Taiwan and elsewhere, according to new research.

The threat group PlushDaemon uses routers and other network device implants to redirect domain name system (DNS) queries to malicious external servers which take over updates to unleash tools used for cyberespionage, researchers at ESET revealed Wednesday.

The network implant, which ESET has dubbed EdgeStepper, sends traffic from infrastructure used for software updates to infrastructure controlled by attackers. The attackers then unleash the downloaders LittleDaemon and DaemonLogistics in the targeted devices. The downloaders deploy a backdoor toolkit which enables cyberespionage.

The attacks have been underway since 2019 with a Beijing university, a Taiwanese electronics manufacturer, a company in the automotive sector and a Japanese manufacturer among the targets, the researchers said in a blog post.

Attackers have used several popular Chinese software products to deploy the attacks, the researchers said.

PlushDaemon likely exploits software vulnerabilities or uses weak default administrative credentials to deploy EdgeStepper, the researchers said.

“EdgeStepper begins redirecting DNS queries to a malicious DNS node that verifies whether the domain in the DNS query message is related to software updates, and if so, it replies with the IP address of the hijacking node,” ESET researcher Facundo Muñoz said in a statement.

PlushDaemon has been active since at least 2018 and has historically conducted cyberespionage campaigns against individuals and entities located in the U.S. and the East Asia-Pacific, the researchers said.

In January, ESET revealed that PlushDaemon had been targeting users in East Asia by compromising a virtual private network (VPN) installer made by the South Korean company IPany to infect devices with malware.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

Next Post

Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

Related Posts

New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login

Oracle on Saturday issued a security alert warning of a fresh security flaw impacting its E-Business Suite that it said could allow unauthorized access to sensitive data. The vulnerability, tracked as CVE-2025-61884, carries a CVSS score of 7.5, indicating high severity. It affects versions from 12.2.3 through 12.2.14. "Easily exploitable vulnerability allows an unauthenticated attacker with
Read More