PlushDaemon Unleashed: A Comedic Take on China’s Self-Inflicted Spyware Saga
PlushDaemon, a Chinese state-aligned threat actor, has been secretly hijacking software updates since 2018. Their signature malware, EdgeStepper, turns routers into mischief makers by rerouting legitimate updates to deliver malicious ones. Why a Chinese group targets fellow Chinese organizations remains a head-scratcher, but keeping network devices secure is the best defense.

Hot Take:
Who would have thought that the Chinese would use their own devices against themselves? PlushDaemon’s antics seem like a bizarre twist on the classic “spy vs. spy” tale, but with software updates instead of trench coats and sunglasses. The real mystery isn’t just how they’ve stayed under the radar, but why they’re so invested in snooping on their own turf. Maybe they’re just really into self-improvement? Or perhaps they just want to make sure everyone is using the latest software update, even if it’s their own malicious version! Who knew cyber espionage could be so… domestic?
Key Points:
- PlushDaemon, a Chinese state-aligned threat actor, has been infecting software updates for years.
- The group targets edge devices to reroute software update requests to malicious servers.
- The malware, EdgeStepper, is written in Go and targets MIPS32 processors common in IoT devices.
- The final payload, SlowStepper, steals data such as passwords and browser cookies.
- Despite being active since 2018, PlushDaemon has flown under the radar.
