PlushDaemon Unleashed: New Cyber Threat Targets South Korea with SlowStepper Malware Mayhem

PlushDaemon, a China-aligned APT group, is wreaking havoc in South Korea with their sneaky SlowStepper backdoor. By swapping legitimate VPN installers with trojanized versions, they’ve turned espionage into an art form. With over 30 modules for data theft and surveillance, SlowStepper is the malware equivalent of a Swiss Army knife.

Pro Dashboard

Hot Take:

Just when you thought your VPN was your digital knight in shining armor, along comes PlushDaemon with a backdoor attack that says, “Surprise! I’m actually the Trojan horse you didn’t ask for.” It’s like your security blanket just became a snuggly horror show!

Key Points:

  • ESET has uncovered a new APT group, PlushDaemon, targeting South Korea.
  • The group used a supply chain attack to compromise IPany’s VPN software.
  • SlowStepper, their custom backdoor, boasts over 30 modules for espionage.
  • The malware uses encrypted DNS queries for stealthy C&C communication.
  • PlushDaemon has been operating under the radar since 2019.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?