PlushDaemon Strikes: New Chinese APT Targets South Korean VPN in Sneaky Supply Chain Sabotage
PlushDaemon, a Chinese threat group, is targeting a South Korean VPN developer with a supply chain attack. They’re using their custom backdoor, SlowStepper, to collect data for cyber-espionage. Think of them as the James Bond of malware, if Bond were a villain with a penchant for stealing secrets via VPNs.

Hot Take:
When it comes to cyber-espionage, PlushDaemon isn’t just playing cat-and-mouse; they’re playing cat-and-mouse-and-backdoor. This Chinese threat group is venturing beyond its usual playground, targeting a South Korean VPN developer in a supply chain attack. If you thought your VPN was your digital invisibility cloak, think again. It’s more like a neon sign saying “hack me!”
Key Points:
- PlushDaemon is a newly discovered Chinese threat group targeting a South Korean VPN developer through a supply chain attack.
- The attack involved deploying a custom backdoor called SlowStepper to collect data for cyber-espionage.
- PlushDaemon typically hijacks legitimate updates of Chinese applications, but this attack marked a deviation.
- The group has been active since 2019, targeting individuals and entities in various countries including the US and New Zealand.
- PlushDaemon uses a variety of tools, mostly programmed in Python and Go, for data collection and espionage activities.
Already a member? Log in here