• China-linked cyberespiona

    From Mike Powell@1:2320/105 to All on Thu Jan 23 10:32:00 2025
    China-linked cyberespionage group PlushDaemon used South Korean VPN service
    to inject malware

    Date:
    Wed, 22 Jan 2025 16:41:46 +0000

    Description:
    ESET's new report shed light on PlushDaemon's malicious activities. Here's
    what we know so far.

    FULL STORY ======================================================================

    A China-linked cyberespionage group has reportedly exploited a legitimate VPN service to spread malware and spy on victims' activities. The ESET security research team found the malicious code alongside the legitimate software in the Windows installer of IPany, a South Korean VPN provider.

    The so-called PlushDaemon APT group is also known to have hijacked legitimate updates of Chinese applications, but this technical-advanced supply-chain attack against a trustworthy Korean VPN firm makes the hacking group "a significant threat to watch for," said ESET experts.

    The SlowStepper backdoor

    ESET's new report shed light on a previously undisclosed China-aligned APT group so-called PlushDaemon which experts believe to have been active since
    at least 2019 and one of its malicious operations aims to spy on the
    target's activities.

    To do so, hackers have hijacked legitimated updates of Chinese apps and launched a supply-chain attack against South Korean VPN developer IPany. Both involve injecting a malicious backdoor into the device while the victims install the software.

    Named SlowStepper, the backdoor is built on an advanced infrastructure that enables extensive data collection and spying through the recording of audio
    and videos.

    "We found no suspicious code on the download page to produce targeted downloads, for example by geofencing to specific targeted regions or IP ranges," experts explain. "Therefore, we believe that anyone using the IPany VPN might have been a valid target."

    When the maliciousIPanyVPNsetup.exeinstaller is executed, it creates several directories and deploys both legitimate and malicious files.

    Experts contacted the VPN software developer to inform them of the
    compromise. The company then removed the malicious installer from its
    website.

    Nonetheless, ESET findings raise concerns for internet users' security, especially considering that the hacking group managed to fly under the radar for so long.

    Experts wrote: "The numerous components in the PlushDaemon toolset, and its rich version history, show that, while previously unknown, this China-aligned APT group has been operating diligently to develop a wide array of tools, making it a significant threat to watch for."

    Worse still, this is far from the only instance in which VPN users so,
    someone actively looking to protect their online data are the main target. Google reported a similar threat at the beginning of January 2025 warning against how Playfulghost attackers used VPN apps to infect devices with malware.

    ======================================================================
    Link to news story: https://www.techradar.com/vpn/china-linked-cyberespionage-group-plushdaemon-us ed-south-korean-vpn-service-to-inject-malware

    $$
    --- SBBSecho 3.20-Linux
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)