URL has been copied successfully!
China”‘linked PlushDaemon hijacks DNS via ‘EdgeStepper’ to weaponize software updates
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

China”‘linked PlushDaemon hijacks DNS via ‘EdgeStepper’ to weaponize software updates

Hijacked update to backdoor deployment: With the network device serving as a stealthy redirect, PlushDaemon then exploits the hijacked update channel to gain access to end-systems. ESET observed how typical victim software (such as a Chinese input-method application) issues an HTTP GET to its update server, but because DNS was hijacked, the request lands at attacker-controlled infrastructure.The payload chain typically begins with LittleDaemon, a downloader posing as a DLL, which checks for the presence of the final payload. If absent, it fetches another component, DaemonicLogistics. That tool then interprets HTTP status codes from the hijacked server as commands to download and install the signature backdoor SlowStepper on the target machines.SlowStepper is a feature-rich espionage backdoor with modules for browser data collection, audio/video capture, document theft, and credential harvesting. PlushDaemon’s move to weaponize network plumbing reflects adversaries shifting away from blunt endpoint strikes toward quieter, trust-abuse techniques. Earlier this year, a China-linked campaign was found implanting backdoors on Juniper routers, showing attackers’ willingness to live on the network kit itself rather than only on PCs.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/4093727/china%e2%80%91linked-plushdaemon-hijacks-dns-via-edgestepper-to-weaponize-software-updates.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link