VPN Slip-Up: When IPany Became a Backdoor to Your Data – A Cyber Comedy of Errors
South Korean VPN provider IPany got caught in a supply chain attack by the PlushDaemon group, who slipped SlowStepper malware into the VPN installer. IPany VPN users might’ve unknowingly downloaded a VPN with a side of cyber espionage, proving once again that even your virtual private network isn’t safe from unwanted guests.

Hot Take:
**_Looks like IPany’s VPN turned into “I Spy on You” VPN! This cyber drama, starring the notorious PlushDaemon, has all the elements of a classic thriller: a sneaky malware plot, an unsuspecting VPN provider, and a cast of compromised computers. The SlowStepper malware might sound slow, but it’s certainly not stepping back from causing chaos!_**
Key Points:
– The PlushDaemon hacking group, linked to China, targeted South Korean VPN provider IPany in a supply chain attack.
– The attack involved compromising IPany’s VPN installer with the SlowStepper malware, affecting customers’ systems.
– Victims include a South Korean semiconductor firm and software development company, with first infections in Japan in November 2023.
– SlowStepper is a stripped-down but stealthy malware capable of extensive data collection and system espionage.
– ESET researchers identified the attack, but infected users must manually clean their systems.