VPN Slip-Up: When IPany Became a Backdoor to Your Data – A Cyber Comedy of Errors

South Korean VPN provider IPany got caught in a supply chain attack by the PlushDaemon group, who slipped SlowStepper malware into the VPN installer. IPany VPN users might’ve unknowingly downloaded a VPN with a side of cyber espionage, proving once again that even your virtual private network isn’t safe from unwanted guests.

Pro Dashboard

Hot Take:

**_Looks like IPany’s VPN turned into “I Spy on You” VPN! This cyber drama, starring the notorious PlushDaemon, has all the elements of a classic thriller: a sneaky malware plot, an unsuspecting VPN provider, and a cast of compromised computers. The SlowStepper malware might sound slow, but it’s certainly not stepping back from causing chaos!_**

Key Points:

– The PlushDaemon hacking group, linked to China, targeted South Korean VPN provider IPany in a supply chain attack.
– The attack involved compromising IPany’s VPN installer with the SlowStepper malware, affecting customers’ systems.
– Victims include a South Korean semiconductor firm and software development company, with first infections in Japan in November 2023.
– SlowStepper is a stripped-down but stealthy malware capable of extensive data collection and system espionage.
– ESET researchers identified the attack, but infected users must manually clean their systems.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?