Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Malware Spread Through DNS Rerouting

November 19, 2025
Reading Time: 4 mins read
in Alerts
Malware Spread Through DNS Rerouting

The threat actor known as PlushDaemon, assessed to be a sophisticated China-aligned group active since at least 2018, has been observed deploying a previously undocumented network backdoor named EdgeStepper. This Go-based tool is central to facilitating Adversary-in-the-Middle (AitM) attacks. ESET security researcher Facundo Muñoz explained that EdgeStepper’s primary function is to redirect all DNS queries to an external, malicious hijacking node. This rerouting effectively steers traffic away from legitimate software update infrastructure toward servers under the attacker’s control, a technique of initial access and lateral movement that has been increasingly adopted by China-affiliated Advanced Persistent Threat (APT) clusters in the last two years.

PlushDaemon’s targets have included a diverse array of entities across the U.S., New Zealand, Cambodia, Hong Kong, Taiwan, South Korea, and mainland China. Earlier in 2023, the group was first documented by ESET for its supply chain attack against a South Korean VPN provider named IPany. That campaign specifically targeted a semiconductor company and a software development firm in South Korea with a feature-rich implant known as SlowStepper. The adversary’s growing victimology also encompasses a university in Beijing, a Taiwanese electronics manufacturer, and companies in the automotive and manufacturing sectors, with recent activity noting targets in Cambodia earlier this year.

The entire attack sequence begins with the threat actor compromising an edge network device, such as a router, to which the target is likely to connect. This compromise is achieved either by exploiting a security flaw in the device’s software or by using weak credentials, allowing the threat actor to deploy EdgeStepper onto the compromised infrastructure. Once deployed, EdgeStepper commences its redirection of DNS queries to a malicious DNS node. This node is designed to verify if the domain in the query relates to software updates; if it does, the node replies with the IP address of the hijacking server. In some observed cases, ESET noted that the DNS node and the hijacking node were the same server, which simply replied to the DNS queries with its own IP address.

Internally, EdgeStepper is structurally composed of two primary modules. The first is the Distributor module, which is tasked with resolving the IP address associated with a specific DNS node domain. The second is the Ruler component, which is subsequently invoked by the Distributor. The Ruler is responsible for configuring the necessary IP packet filter rules on the compromised device, typically utilizing iptables, to enforce the malicious DNS redirection. This mechanism is crucial for the group’s ability to maintain control over the traffic flow and execute the subsequent stages of their attack chain.

The ultimate objective of the EdgeStepper operation is to hijack the update channels of specific software, including several Chinese applications like Sogou Pinyin. This hijacking allows the attackers to deliver a malicious DLL, known as LittleDaemon, from a threat actor-controlled server. LittleDaemon serves as a first-stage implant, designed to communicate with the attacker’s infrastructure to fetch a downloader called DaemonicLogistics, provided the more advanced SlowStepper backdoor is not already running on the infected system. The role of DaemonicLogistics is straightforward: it downloads the full SlowStepper backdoor from the server and executes it. SlowStepper is a powerful tool with an extensive feature set for gathering system information, exfiltrating files, stealing browser credentials, extracting data from numerous messaging applications, and even includes a feature for self-uninstallation.

Reference:

  • DNS Rerouting Used To Deliver Malware Through Compromised Software Updates
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

Malware Spread Through DNS Rerouting

Old Finger Protocol Used In Malware

November 19, 2025
Malware Spread Through DNS Rerouting

AI Agents Turned Against Each Other

November 19, 2025
Fortinet Flaw Used To Create Admins

Interview Campaign Exploits JSON Storage

November 18, 2025
Fortinet Flaw Used To Create Admins

Iran Hackers Launch SpearSpecter Spying

November 18, 2025
Fortinet Flaw Used To Create Admins

Fortinet Flaw Used To Create Admins

November 18, 2025
Dragon Breath Deploys Roninloader Ghosts

Rondodox Targets XWiki To Grow Botnet

November 17, 2025

Latest Alerts

Old Finger Protocol Used In Malware

Malware Spread Through DNS Rerouting

AI Agents Turned Against Each Other

Interview Campaign Exploits JSON Storage

Iran Hackers Launch SpearSpecter Spying

Fortinet Flaw Used To Create Admins

Subscribe to our newsletter

    Latest Incidents

    France Hit By Major Cyberattack

    Danish Parties Targeted By Cyberattack

    Under Armour Hit By Data Breach

    Princeton Reports Donor Data Breach

    Massive Cloud DDoS Hits Microsoft Azure

    Kenyan Gov Sites Back Online After Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial