Tech

China-linked cyberespionage group PlushDaemon used South Korean VPN service to inject malware

Share
Share

A China-linked cyberespionage group has reportedly exploited a legitimate VPN service to spread malware and spy on victims’ activities. The ESET security research team found the malicious code – alongside the legitimate software – in the Windows installer of IPany, a South Korean VPN provider.

The so-called PlushDaemon APT group is also known to have hijacked legitimate updates of Chinese applications, but this technical-advanced supply-chain attack against a trustworthy Korean VPN firm makes the hacking group “a significant threat to watch for,” said ESET experts.

The SlowStepper backdoor

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
System learns after watching how-to videos
Tech

System learns after watching how-to videos

Kushal Kedia (left), a doctoral student in the field of computer science,...

Palantir to develop “ImmigrationOS” for ICE to speed up deportations
Tech

Palantir to develop “ImmigrationOS” for ICE to speed up deportations

Software firm Palantir secures an almost $30 million contract with ICE The...

Agrivoltaics study reveals potential solution to land competition between agriculture and solar energy
Tech

Agrivoltaics study reveals potential solution to land competition between agriculture and solar energy

Agrivoltaics solutions. Credit: Politecnico di Milano Can agriculture and solar energy work...