• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Cybersecurity Market

Cybersecurity Technologies & Markets

  • Cybersecurity Events 2026-2027
  • Sponsored Post
  • Market Reports
  • About
    • GDPR
  • Contact

PlushDaemon’s DNS-Hijacking Espionage Campaign Exposed

November 19, 2025 By admin Leave a Comment

It’s unsettling how quiet some of these operations run — you blink, and suddenly the most routine part of computing, software updates, becomes the attack vector. That’s essentially what ESET researchers uncovered when they began tracing activity tied to PlushDaemon, a China-aligned threat actor that’s been operating under the radar for several years. Their latest discovery centers on a previously undocumented implant called EdgeStepper, a tool purpose-built to sit inside network devices like routers and manipulate traffic without raising alarms.

EdgeStepper doesn’t go for showy exploits or loud malware behavior. Instead, it performs a subtle adversary-in-the-middle maneuver by intercepting and redirecting DNS traffic. Whenever a machine on a compromised network reaches out for a legitimate software update, EdgeStepper quietly rewires that request to a malicious DNS server under attacker control. That server responds with an IP address of a hijacking node — a server designed to impersonate legitimate infrastructure, deliver tampered updates, and deploy the next stage malware. ESET even observed cases where the DNS server and hijacking node were the same machine, simplifying the operation even further.

Once that traffic rerouting succeeds, PlushDaemon begins dropping tools with almost theatrical naming flair — LittleDaemon, DaemonicLogistics, and eventually the real objective: SlowStepper, a modular espionage backdoor with dozens of components. With it, attackers gain the ability to exfiltrate data, persist for long periods, and remotely control compromised systems.

The broader campaign isn’t new — PlushDaemon appears active since at least 2018 — but the scope is widening. Victims include targets in the United States, Taiwan, Hong Kong, New Zealand, Cambodia, Japan, and even mainland China. The profile of affected organizations ranges from universities and electronics manufacturers to companies in the automotive and industrial sectors. One detail that stands out is that several popular Chinese consumer software products had their update channels hijacked. That’s bold — and very efficient — because users trust updates, apply them automatically, and rarely scrutinize them.

ESET suggests the attackers gain initial access by exploiting unpatched vulnerabilities or weak/default router credentials, which unfortunately remains common enough to make this tactic viable on a global scale. Once in, EdgeStepper starts running, and the domino effect unfolds quietly behind the scenes.

Facundo Muñoz, the researcher who led the analysis, put it plainly: once EdgeStepper is active, every DNS query becomes an opportunity. If the request matches a software update domain, the system gets steered into hostile territory. If not, the traffic passes through untouched — making the whole mechanism almost invisible unless someone goes looking for it.

Cyberespionage operations like this thrive on patience and subtlety. PlushDaemon’s infrastructure, tooling maturity, and evolving tactics — including prior supply-chain attacks and web-server exploits — show a threat actor comfortable with long-term access rather than smash-and-grab hacking.

It’s another reminder that the most dangerous compromises aren’t always the loud ones. Sometimes the attacker is already sitting inside the router, quietly turning routine maintenance into a foothold for persistent surveillance — and no one notices until a researcher somewhere finally connects the dots.

Filed Under: News

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • Stellar Cyber Climbs to #2 in MSSP Alert 2025 Rankings, Signaling Deepening Trust Across the Global SecOps Ecosystem
  • Ascend 2026, May–October 2026, Global Event Series
  • Black Hat Europe 2025, December 9–12, London, United Kingdom
  • C1 and Texas Southern University Launch Cybersecurity Lab, Houston, Texas
  • GDIT Wins $285M Cybersecurity Contract to Fortify Virginia’s Digital Backbone
  • Why ServiceNow Wants Armis: Security as the Missing Layer in the Entrprise Workflow Empire
  • Opal Security Names Howard Ting CEO as AI Access Governance Enters Its Defining Moment
  • Cyber Week Israel 2025, December 8–11, Tel Aviv
  • Qryptonic Names Senior Leadership Team Driving Quantum-Era Cryptographic Security
  • Thales AI Security Fabric, 2025–2026: A New Perimeter for the Age of Agentic AI

Media Partners

  • Technology Conferences
  • Technologies
  • Event Sharing Network
  • GameTech Market
  • OSINT
  • Event Calendar
  • Calendarial
  • Media Presser
  • 3V

Media Partners

  • App Coding
  • API Coding
  • Blockchaining
  • S3H
  • Press Club
  • VPNW
  • Opinion
  • Media Press Release
  • Defense Market

Copyright © 2022 CybersecurityMarket.com

Technologies, Market Analysis & Market Research