Cyber Espionage Hijinks: PlushDaemon’s Sneaky EdgeStepper Malware Strikes Again!
PlushDaemon hackers are hijacking software updates using a crafty implant called EdgeStepper. They’ve targeted entities from the U.S. to New Zealand since 2018, slipping malware into unsuspecting systems like an unwanted guest at a dinner party. Keep your routers locked up tighter than Fort Knox to avoid unwanted cyber company!

Hot Take:
It’s official, folks: PlushDaemon is the cyber equivalent of that one friend who “borrowed” your favorite DVD and never gave it back. Only this time, they’re borrowing software updates and leaving behind a gift basket of malware. Thanks, but no thanks!
Key Points:
- PlushDaemon, a China-linked threat actor, uses an implant called EdgeStepper to hijack software update traffic.
- Targets include electronics manufacturers, universities, and auto plants, with a focus on the U.S., China, and more.
- Attackers exploit router vulnerabilities to deploy EdgeStepper, redirecting DNS queries to malicious nodes.
- The malware chain includes LittleDaemon, DaemonicLogistics, and the SlowStepper backdoor.
- ESET provides a detailed report with technical details and indicators of compromise.
Already a member? Log in here
