PlushDaemon compromises network devices for adversary-in-the-middle attacks

Nov. 21, 2025, 1:35 a.m.

Description

China-aligned threat actor PlushDaemon has been conducting espionage operations since 2018, targeting entities in China, Taiwan, Hong Kong, Cambodia, South Korea, the United States, and New Zealand. The group employs a custom backdoor called SlowStepper and uses a network implant named EdgeStepper to hijack legitimate updates. EdgeStepper redirects DNS queries to a malicious node, rerouting traffic from legitimate infrastructure to attacker-controlled servers. The group has also exploited web server vulnerabilities and performed a supply-chain attack. PlushDaemon's adversary-in-the-middle technique involves compromising network devices, deploying EdgeStepper, and using it to redirect DNS queries for software updates to malicious nodes. This allows them to serve malicious updates containing the LittleDaemon downloader, which then deploys the SlowStepper implant.

Date

  • Created: Nov. 19, 2025, 9:09 p.m.
  • Published: Nov. 19, 2025, 9:09 p.m.
  • Modified: Nov. 21, 2025, 1:35 a.m.

Indicators

  • ee6e19fff5c0f92b22245dd8ba5d3b93e664829f04c5bc445f631adc6acc0659
  • 86ec75124c41ce5dfe05adeaf3c889c00f693c94903c22ad682580cae0ce6a94
  • 8.212.132.120
  • 47.242.198.250
  • test.dsc.wcsset.com
  • ds20221202.dsc.wcsset.com
  • wcsset.com

Attack Patterns

  • DaemonicLogistics
  • EdgeStepper
  • LittleDaemon
  • SlowStepper
  • PlushDaemon

Additional Informations

  • Automotive
  • Technology
  • Education
  • Manufacturing
  • New Zealand
  • Hong Kong
  • Taiwan
  • China
  • Cambodia
  • United States of America