PlushDaemon Unleashed: New Cyber Threat Targets South Korea with SlowStepper Malware Mayhem
PlushDaemon, a China-aligned APT group, is wreaking havoc in South Korea with their sneaky SlowStepper backdoor. By swapping legitimate VPN installers with trojanized versions, they’ve turned espionage into an art form. With over 30 modules for data theft and surveillance, SlowStepper is the malware equivalent of a Swiss Army knife.

Hot Take:
Just when you thought your VPN was your digital knight in shining armor, along comes PlushDaemon with a backdoor attack that says, “Surprise! I’m actually the Trojan horse you didn’t ask for.” It’s like your security blanket just became a snuggly horror show!
Key Points:
- ESET has uncovered a new APT group, PlushDaemon, targeting South Korea.
- The group used a supply chain attack to compromise IPany’s VPN software.
- SlowStepper, their custom backdoor, boasts over 30 modules for espionage.
- The malware uses encrypted DNS queries for stealthy C&C communication.
- PlushDaemon has been operating under the radar since 2019.
Already a member? Log in here