By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
Computing

EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

News Room
Last updated: 2025/11/19 at 5:44 AM
News Room Published 19 November 2025
Share
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
SHARE

Nov 19, 2025Ravie LakshmananCyber Espionage / Malware

The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate adversary-in-the-middle (AitM) attacks.

EdgeStepper “redirects all DNS queries to an external, malicious hijacking node, effectively rerouting the traffic from legitimate infrastructure used for software updates to attacker-controlled infrastructure,” ESET security researcher Facundo Muñoz said in a report shared with The Hacker News.

Known to be active since at least 2018, PlushDaemon is assessed to be a China-aligned group that has attacked entities in the U.S., New Zealand, Cambodia, Hong Kong, Taiwan, South Korea, and mainland China.

DFIR Retainer Services

It was first documented by the Slovak cybersecurity company earlier this January, detailing a supply chain attack aimed at a South Korean virtual private network (VPN) provider named IPany to target a semiconductor company and an unidentified software development company in South Korea with a feature-rich implant dubbed SlowStepper.

Among the adversary’s victims include a university in Beijing, a Taiwanese company that manufactures electronics, a company in the automotive sector, and a branch of a Japanese company in the manufacturing sector. Earlier this month, ESET also said it observed PlushDaemon targeting two entities in Cambodia this year, a company in the automotive sector and a branch of a Japanese company in the manufacturing sector, with SlowStepper.

The primary initial access mechanism for the threat actor is to leverage AitM poisoning, a technique that has been embraced by an “ever increasing” number of China-affiliated advanced persistent threat (APT) clusters in the last two years, such as LuoYu, Evasive Panda, BlackTech, TheWizards APT, Blackwood, and FontGoblin. ESET said it’s tracking ten active China-aligned groups that have hijacked software update mechanisms for initial access and lateral movement.

The attack essentially commences with the threat actor compromising an edge network device (e.g., a router) that its target is likely to connect to. This is accomplished by either exploiting a security flaw in the software or through weak credentials, allowing them to deploy caEdgeStepper.

“Then, EdgeStepper begins redirecting DNS queries to a malicious DNS node that verifies whether the domain in the DNS query message is related to software updates, and if so, it replies with the IP address of the hijacking node,” Muñoz explained. “Alternatively, we have also observed that some servers are both the DNS node and the hijacking node; in those cases, the DNS node replies to DNS queries with its own IP address.”

CIS Build Kits

Internally, the malware consists of two moving parts: a Distributor module that resolves the IP address associated with the DNS node domain (“test.dsc.wcsset[.]com”) and invokes the Ruler component responsible for configuring IP packet filter rules using iptables.

The attack specifically checks for several Chinese software, including Sogou Pinyin, to have their update channels hijacked by means of EdgeStepper to deliver a malicious DLL (“popup_4.2.0.2246.dll” aka LittleDaemon) from a threat actor-controlled server. A first-stage deployed through hijacked updates, LittleDaemon is designed to communicate with the attacker node to fetch a downloader referred to as DaemonicLogistics if SlowStepper is not running on the infected system.

The main purpose of DaemonicLogistics is to download the SlowStepper backdoor from the server and execute it. SlowStepper supports an extensive set of features to gather system information, files, browser credentials, extract data from a number of messaging apps, and even uninstall itself.

“These implants give PlushDaemon the capability to compromise targets anywhere in the world,” Muñoz said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Octopus-backed Dost launches in UK with £6m round – UKTN Octopus-backed Dost launches in UK with £6m round – UKTN
Next Article Gemini 3 is Google’s most advanced AI model yet Gemini 3 is Google’s most advanced AI model yet
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

No Time to Read a Long Google Doc? Try Gemini’s Quick AI Audio Summaries
No Time to Read a Long Google Doc? Try Gemini’s Quick AI Audio Summaries
News
Top Strategies for Scaling Professional Teams in 2026
Top Strategies for Scaling Professional Teams in 2026
Gadget
Stripe’s x402 Turned Bitcoin’s Micropayments Dream Into a Bot Economy | HackerNoon
Stripe’s x402 Turned Bitcoin’s Micropayments Dream Into a Bot Economy | HackerNoon
Computing
Sky adding HBO Max is great, but I do wish it made 4K the standard
Sky adding HBO Max is great, but I do wish it made 4K the standard
Gadget

You Might also Like

Stripe’s x402 Turned Bitcoin’s Micropayments Dream Into a Bot Economy | HackerNoon
Computing

Stripe’s x402 Turned Bitcoin’s Micropayments Dream Into a Bot Economy | HackerNoon

24 Min Read
The HackerNoon Newsletter: AI Exposes the Fragility of Good Enough Data Operations (2/15/2026) | HackerNoon
Computing

The HackerNoon Newsletter: AI Exposes the Fragility of Good Enough Data Operations (2/15/2026) | HackerNoon

3 Min Read
Week in Review: Most popular stories on GeekWire for the week of Feb. 8, 2026
Computing

Week in Review: Most popular stories on GeekWire for the week of Feb. 8, 2026

3 Min Read
Pinterest Trends Strategy: How to Use Search Momentum to Drive Traffic
Computing

Pinterest Trends Strategy: How to Use Search Momentum to Drive Traffic

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?