PlushDaemon compromises network devices for adversary-in-the-middle attacks
Nov. 21, 2025, 1:35 a.m.
Description
China-aligned threat actor PlushDaemon has been conducting espionage operations since 2018, targeting entities in China, Taiwan, Hong Kong, Cambodia, South Korea, the United States, and New Zealand. The group employs a custom backdoor called SlowStepper and uses a network implant named EdgeStepper to hijack legitimate updates. EdgeStepper redirects DNS queries to a malicious node, rerouting traffic from legitimate infrastructure to attacker-controlled servers. The group has also exploited web server vulnerabilities and performed a supply-chain attack. PlushDaemon's adversary-in-the-middle technique involves compromising network devices, deploying EdgeStepper, and using it to redirect DNS queries for software updates to malicious nodes. This allows them to serve malicious updates containing the LittleDaemon downloader, which then deploys the SlowStepper implant.
Tags
Date
- Created: Nov. 19, 2025, 9:09 p.m.
- Published: Nov. 19, 2025, 9:09 p.m.
- Modified: Nov. 21, 2025, 1:35 a.m.
Indicators
- ee6e19fff5c0f92b22245dd8ba5d3b93e664829f04c5bc445f631adc6acc0659
- 86ec75124c41ce5dfe05adeaf3c889c00f693c94903c22ad682580cae0ce6a94
- 8.212.132.120
- 47.242.198.250
- test.dsc.wcsset.com
- ds20221202.dsc.wcsset.com
- wcsset.com
Attack Patterns
- DaemonicLogistics
- EdgeStepper
- LittleDaemon
- SlowStepper
- PlushDaemon
Additional Informations
- Automotive
- Technology
- Education
- Manufacturing
- New Zealand
- Hong Kong
- Taiwan
- China
- Cambodia
- United States of America