Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese PlushDaemon Hackers use EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers

Posted on November 19, 2025November 19, 2025 By CWS

A China-aligned risk group generally known as PlushDaemon has been weaponizing a complicated assault technique to infiltrate networks throughout a number of areas since 2018.

The group’s main technique entails intercepting respectable software program updates by deploying a specialised instrument referred to as EdgeStepper, which acts as a bridge between customers’ computer systems and malicious servers.

This method permits hackers to inject malware instantly into what customers consider are genuine replace installations from trusted software program distributors.

PlushDaemon’s marketing campaign has focused people and organizations in america, Taiwan, China, Hong Kong, New Zealand, and Cambodia.

The group employs a number of assault vectors, together with exploitation of software program vulnerabilities, weak community gadget credentials, and complicated supply-chain compromises.

First phases of the assault (Supply – Welivesecurity)

Throughout a 2023 investigation, researchers uncovered the group’s involvement in a significant supply-chain assault affecting a South Korean VPN service, demonstrating their functionality to function at scale.

ESET safety analysts recognized and examined the EdgeStepper malware after discovering an ELF binary file on VirusTotal that contained infrastructure particulars linked to PlushDaemon operations.

The researchers discovered that the instrument, internally codenamed dns_cheat_v2 by its builders, represents a essential element within the group’s assault infrastructure.

The evaluation revealed how this community implant capabilities to intercept and redirect DNS queries, primarily hijacking the conventional replace course of customers count on from respectable software program.

Remaining stage of the replace hijacking (Supply – Welivesecurity)

The assault demonstrates a multi-stage an infection course of designed to evade conventional safety defenses.

As soon as attackers compromise a community gadget resembling a router via vulnerability exploitation or weak credentials, EdgeStepper begins its operation by intercepting DNS site visitors.

When a consumer makes an attempt to replace software program like Sogou Pinyin or comparable Chinese language purposes, the malware redirects the connection to an attacker-controlled server.

This hijacking node then instructs the respectable software program to obtain a malicious DLL file as a substitute of the real replace.

DNS Interception and Site visitors Redirection Mechanism

The technical basis of EdgeStepper’s effectiveness lies in its elegant but harmful strategy to community manipulation.

EdgeStepper workflow (Supply – Welivesecurity)

Written in Go programming language utilizing the GoFrame framework and compiled for MIPS32 processors, the malware begins operation by studying an encrypted configuration file named bioset.conf.

The decryption course of makes use of AES CBC encryption with a default key and initialization vector derived from the string “I Love Go Body,” which is a part of the GoFrame library’s customary implementation.

As soon as decrypted, the configuration reveals two essential parameters: toPort specifies the listening port, whereas host identifies the area identify of the malicious DNS node.

EdgeStepper then initializes two core techniques referred to as Distributor and Ruler. The Distributor element resolves the IP tackle of the malicious DNS node and coordinates the site visitors stream, whereas the Ruler system points iptables instructions to redirect all UDP site visitors on port 53 to EdgeStepper’s designated port.

The malware accomplishes this redirection utilizing the command: “iptables -t nat -I PREROUTING -p udp –dport 53 -j REDIRECT –to-port [value_from_toPort]”.

This command primarily forces all DNS requests from gadgets on the community to move via EdgeStepper earlier than reaching respectable DNS servers, creating a whole man-in-the-middle place that enables good interception and modification of replace directions despatched to software program purposes.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Chinese, EdgeStepper, Hackers, Hijack, Legitimate, Malicious, PlushDaemon, Redirect, Servers, Tool, Updates

Post navigation

Previous Post: Massive Hacking Operation WrtHug Compromises Thousands of ASUS Routers Worldwide
Next Post: ‘The Gentlemen’ Ransomware Group with Dual-Extortion Strategy Encrypts and Exfiltrates Data

Related Posts

New Attack Combines Ghost SPNs and Kerberos Reflection to Elevate Privileges on SMB Servers Cyber Security News
13-Year-Old Dylan – Youngest Security Researcher Collaborates with Microsoft Security Response Center Cyber Security News
Hackers Allegedly Claim Breach of Scania Financial Services, Sensitive Data Stolen Cyber Security News
Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild Cyber Security News
MAD-CAT Meow Attack Tool to Simulate Real-World Data Corruption Attacks Cyber Security News
WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Attacking Palo Alto Networks’ GlobalProtect VPN Portals with 2.3 Million Attacks
  • Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal
  • How to Solve Alert Overload in Your SOC
  • Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
  • Secure.com Raises $4.5 Million for Agentic Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Attacking Palo Alto Networks’ GlobalProtect VPN Portals with 2.3 Million Attacks
  • Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal
  • How to Solve Alert Overload in Your SOC
  • Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
  • Secure.com Raises $4.5 Million for Agentic Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News