• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 56000 (56k) monthly views (unique) and 285135 clicks per month, as per Google Analytics! Thank you for your support! 🎉

PlushDaemon Hackers Hijack Software Updates in Major Supply-Chain Attacks

johny899

New Member
Content Writer
Messages
859
Reaction score
3
Points
23
Balance
$1,053.6USD
You can’t imagine this story! There is a hacking group called PlushDaemon that is now buying and hijacking software updates to attack computers. Yep, you heard me right, software updates, the things that you trust every day. I'm always interested in cybersecurity-related stories, so that immediately caught my attention.

Who are the PlushDaemon hackers?​

A brief overview

PlushDaemon
is a hacking group operating on behalf of China. The group has been active since approximately 2018. They launch attacks in multiple locations: U.S., China, Taiwan, Hong Kong, South Korea, and New Zealand. They will target even factory electronics, universities, and car manufacturers. All very serious stuff.

How the attack works​

Step-by-step explanation

The hackers gained an advantage by cleverly hijacking software updates. Here's how they do it:

• Finding a router or server with a weak password, or an old vulnerability, they break in.
• They install a tool called EdgeStepper.
• EdgeStepers monitors all DNS requests (how your computer visits web pages).
• When it sees your computer request a software update, it will quietly redirect the traffic to the hackers' fake update server.
• Your computer downloads the usual software update but instead downloads malware called LittleDaemon.
• LittleDaemon downloads another tool called DaemonicLogistics which installs their primary backdoor, SlowStepper.

SlowStepper allows hackers to
  • Read your documents
  • Record your keystrokes
  • Steal your passwords, and
  • See your browser history
Essentially spy on almost everything.

Creepy, right? Did you ever think that the trusted "updates" were the source of your betrayal?

Why this attack is dangerous​

Because updates are supposed to be safe.

We generally trust the software updates without think about it. I mean, who really stops and checks all updates? I certainly don't every time. But PlushDaemon is using that trust to their advantage. They are embedding you through the update process itself, making it very difficult to detect.

Anyone could be affected.

And you might say "I don't work at a large company, why would hackers target me?" The simple answer is:
Because your device could be the entry point into bigger targets. To be honest, I've downloaded small tools at one point without checking the update source, maybe you have too?

My personal thoughts.​

I feel like this attack method is one of the sneakiest in recent memory.

Why?

Because the hackers do not hit you directly. They wait for you to click "Update" and boom, they just dropped in their malware.
This reminds me that we must be cautious of not just what we install- but also where the update is coming from.
 
Top