China-linked cyberespionage group PlushDaemon used South Korean VPN service to inject malware


A China-linked cyberespionage group has reportedly exploited a legitimate VPN service to spread malware and spy on victims’ activities. The ESET security research team found the malicious code – alongside the legitimate software – in the Windows installer of IPany, a South Korean VPN provider.

The so-called PlushDaemon APT group is also known to have hijacked legitimate updates of Chinese applications, but this technical-advanced supply-chain attack against a trustworthy Korean VPN firm makes the hacking group “a significant threat to watch for,” said ESET experts.

The SlowStepper backdoor

https://cdn.mos.cms.futurecdn.net/TWkP7ZurZMY6uepDxsK6Ha-1200-80.jpg



Source link
chiara.castro@futurenet.com (Chiara Castro)

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img