Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese PlushDaemon Hackers use EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers

Posted on November 19, 2025November 19, 2025 By CWS

A China-aligned risk group generally known as PlushDaemon has been weaponizing a complicated assault technique to infiltrate networks throughout a number of areas since 2018.

The group’s main technique entails intercepting respectable software program updates by deploying a specialised instrument referred to as EdgeStepper, which acts as a bridge between customers’ computer systems and malicious servers.

This method permits hackers to inject malware instantly into what customers consider are genuine replace installations from trusted software program distributors.

PlushDaemon’s marketing campaign has focused people and organizations in america, Taiwan, China, Hong Kong, New Zealand, and Cambodia.

The group employs a number of assault vectors, together with exploitation of software program vulnerabilities, weak community gadget credentials, and complicated supply-chain compromises.

First phases of the assault (Supply – Welivesecurity)

Throughout a 2023 investigation, researchers uncovered the group’s involvement in a significant supply-chain assault affecting a South Korean VPN service, demonstrating their functionality to function at scale.

ESET safety analysts recognized and examined the EdgeStepper malware after discovering an ELF binary file on VirusTotal that contained infrastructure particulars linked to PlushDaemon operations.

The researchers discovered that the instrument, internally codenamed dns_cheat_v2 by its builders, represents a essential element within the group’s assault infrastructure.

The evaluation revealed how this community implant capabilities to intercept and redirect DNS queries, primarily hijacking the conventional replace course of customers count on from respectable software program.

Remaining stage of the replace hijacking (Supply – Welivesecurity)

The assault demonstrates a multi-stage an infection course of designed to evade conventional safety defenses.

As soon as attackers compromise a community gadget resembling a router via vulnerability exploitation or weak credentials, EdgeStepper begins its operation by intercepting DNS site visitors.

When a consumer makes an attempt to replace software program like Sogou Pinyin or comparable Chinese language purposes, the malware redirects the connection to an attacker-controlled server.

This hijacking node then instructs the respectable software program to obtain a malicious DLL file as a substitute of the real replace.

DNS Interception and Site visitors Redirection Mechanism

The technical basis of EdgeStepper’s effectiveness lies in its elegant but harmful strategy to community manipulation.

EdgeStepper workflow (Supply – Welivesecurity)

Written in Go programming language utilizing the GoFrame framework and compiled for MIPS32 processors, the malware begins operation by studying an encrypted configuration file named bioset.conf.

The decryption course of makes use of AES CBC encryption with a default key and initialization vector derived from the string “I Love Go Body,” which is a part of the GoFrame library’s customary implementation.

As soon as decrypted, the configuration reveals two essential parameters: toPort specifies the listening port, whereas host identifies the area identify of the malicious DNS node.

EdgeStepper then initializes two core techniques referred to as Distributor and Ruler. The Distributor element resolves the IP tackle of the malicious DNS node and coordinates the site visitors stream, whereas the Ruler system points iptables instructions to redirect all UDP site visitors on port 53 to EdgeStepper’s designated port.

The malware accomplishes this redirection utilizing the command: “iptables -t nat -I PREROUTING -p udp –dport 53 -j REDIRECT –to-port [value_from_toPort]”.

This command primarily forces all DNS requests from gadgets on the community to move via EdgeStepper earlier than reaching respectable DNS servers, creating a whole man-in-the-middle place that enables good interception and modification of replace directions despatched to software program purposes.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Chinese, EdgeStepper, Hackers, Hijack, Legitimate, Malicious, PlushDaemon, Redirect, Servers, Tool, Updates

Post navigation

Previous Post: Massive Hacking Operation WrtHug Compromises Thousands of ASUS Routers Worldwide
Next Post: ‘The Gentlemen’ Ransomware Group with Dual-Extortion Strategy Encrypts and Exfiltrates Data

Related Posts

Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands Cyber Security News
PoC Exploit Released for ImageMagick RCE Vulnerability Cyber Security News
Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions Cyber Security News
Nimbus Manticore Attacking Defense and Telecom Sectors With New Malware Cyber Security News
Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control Cyber Security News
Halo Security Honored with 2025 MSP Today Product of the Year Award Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark