PlushDaemon Exploits Network Devices for Stealthy Attacks

PlushDaemon Exploits Network Devices for Stealthy Attacks

In an era where cyber espionage continues to evolve with alarming sophistication, a China-aligned threat actor known as PlushDaemon has emerged as a significant player in targeting network devices for stealthy, adversary-in-the-middle attacks. Active since at least 2018, this group has focused its espionage operations on a wide range of individuals and organizations across regions including China, Taiwan, Hong Kong, Cambodia, South Korea, the United States, and New Zealand. By leveraging advanced tools such as the custom backdoor SlowStepper and the network implant EdgeStepper, PlushDaemon executes highly covert operations that hijack legitimate software updates, redirecting traffic to malicious infrastructure. Research from ESET has uncovered the intricate mechanisms behind these attacks, shedding light on how the group compromises network devices like routers to manipulate DNS queries and deploy malicious payloads. This article delves into the specifics of PlushDaemon’s tactics, exploring the tools and techniques that enable such stealthy infiltrations, and highlighting the global impact of their activities on various sectors.

1. Understanding PlushDaemon’s Espionage Operations

PlushDaemon stands out as a persistent threat actor with a clear focus on espionage, targeting a diverse set of entities across multiple continents. The group’s operations span critical regions, affecting both governmental and private sector organizations with a particular emphasis on technology and manufacturing industries. Their primary method involves hijacking legitimate software updates through a network implant called EdgeStepper, which redirects traffic to attacker-controlled servers. Beyond this, PlushDaemon has demonstrated versatility in attack vectors, exploiting vulnerabilities in web servers and even orchestrating supply-chain attacks, such as the notable 2023 compromise of a South Korean VPN service. The geographical spread of their victims, based on telemetry data since 2019, includes significant activity in the United States, Taiwan, China, Hong Kong, New Zealand, and Cambodia, with targets ranging from universities to automotive companies. This wide-reaching impact underscores the group’s sophisticated approach to selecting high-value targets for intelligence gathering.

The scope of PlushDaemon’s activities reveals a calculated strategy aimed at long-term access and data exfiltration. In China alone, from 2021 to the present, compromised entities include a prominent university in Beijing and a Taiwanese electronics manufacturer operating in the region. Meanwhile, recent activities in Cambodia have seen attacks on an automotive sector company and a branch of a Japanese manufacturing firm. These targets suggest a deliberate focus on sectors with strategic importance, likely to extract intellectual property or sensitive operational data. The use of custom tools like the SlowStepper backdoor further enhances their ability to maintain persistence within compromised environments. As cyber threats continue to globalize, understanding the profile of actors like PlushDaemon becomes essential for building effective defenses against such persistent and well-resourced adversaries.

2. Dissecting the Adversary-in-the-Middle Attack Strategy

At the core of PlushDaemon’s methodology lies the adversary-in-the-middle (AitM) attack, a technique that manipulates network traffic by compromising devices such as routers. The initial step involves gaining access to these devices, often through exploiting software vulnerabilities or leveraging weak or default administrative credentials. Once access is secured, the attackers deploy EdgeStepper, a network implant designed to intercept and redirect DNS queries. This implant forwards traffic to a malicious DNS node, which identifies requests related to software updates—such as those for popular Chinese software like Sogou Pinyin—and responds with the IP address of a hijacking node. This redirection ensures that legitimate update processes are diverted to attacker-controlled infrastructure, setting the stage for further compromise. The precision of this approach highlights the group’s deep understanding of network protocols and software update mechanisms.

Following the redirection, the hijacking node plays a critical role by intercepting HTTP requests from the updating software, replacing legitimate communications with instructions to download malicious files. For instance, the software might be directed to retrieve a seemingly harmless DLL file, which in reality is a malicious payload like LittleDaemon. This payload is then downloaded and executed, effectively breaching the target system under the guise of a routine update. The final stage involves completing the hijack, where the software unknowingly retrieves and installs the malicious content from the hijacking node. This seamless integration of malicious payloads into trusted processes demonstrates the stealth and effectiveness of PlushDaemon’s AitM strategy, posing significant challenges for detection and mitigation by traditional security measures.

3. EdgeStepper: A Closer Look at the Network Implant

EdgeStepper, internally named “dns_cheat_v2” by its developers, serves as the linchpin of PlushDaemon’s ability to manipulate network traffic. Developed in the Go programming language using the open-source GoFrame framework, this implant is compiled as an ELF file specifically for MIPS32 processors, indicating a targeted approach toward network hardware like routers. Its primary function is to redirect DNS traffic by reading and decrypting configuration data from a file located at “/etc/bioset.conf,” using AES CBC encryption with a default key and initialization vector. The configuration specifies critical parameters such as the port for listening (often set to 1090) and the domain of the malicious DNS node to which traffic is forwarded. This setup allows EdgeStepper to act as a covert intermediary, ensuring that DNS queries from targeted devices are rerouted to attacker-controlled infrastructure without raising immediate suspicion.

The functionality of EdgeStepper is further divided into two key systems: the Distributor and the Ruler. The Distributor resolves the IP addresses associated with the malicious DNS node and manages the redirection of traffic from port 53 to the configured port. Meanwhile, the Ruler system utilizes iptables commands to establish and later remove rules that redirect UDP traffic on port 53, effectively positioning EdgeStepper as a DNS proxy. When a DNS message arrives, it is validated for protocol compliance before being forwarded to the malicious node, with the response then relayed back to the originating device. This intricate workflow ensures that software update requests are consistently diverted to hijacking nodes, facilitating the delivery of malicious payloads. The technical sophistication of EdgeStepper underscores the advanced capabilities of PlushDaemon in compromising network infrastructure.

4. LittleDaemon: The Initial Payload in the Attack Chain

LittleDaemon represents the first-stage malware deployed through hijacked software updates, acting as a gateway for further compromise. Available in both 32-bit DLL and executable formats, this component is designed to communicate with the hijacking node to retrieve the next stage of the attack, a downloader named DaemonicLogistics. Notably, LittleDaemon does not establish persistence on the infected system, focusing instead on its role as an intermediary. Its initial operation involves checking whether the SlowStepper backdoor is already active on the target machine. If absent, LittleDaemon proceeds to connect with the hijacking node, often through redirected requests to legitimate domains or specific IP addresses, to download its payload. This process highlights the group’s reliance on deception, using trusted communication channels to mask malicious intent.

Once the connection is established, LittleDaemon sends an HTTP GET request to fetch DaemonicLogistics, subsequently decrypting the received data using a series of XOR operations before executing it. The use of legitimate-looking domains in these requests, such as those associated with popular software, ensures that the traffic blends with normal network activity, reducing the likelihood of detection. This stage of the attack chain is critical, as it bridges the gap between the initial network compromise and the deployment of more persistent malware. The transient nature of LittleDaemon, combined with its ability to operate under the radar, exemplifies the layered approach PlushDaemon employs to infiltrate systems. Security teams must remain vigilant for such subtle indicators of compromise, as they often precede more damaging payloads.

5. DaemonicLogistics: Facilitating the SlowStepper Deployment

DaemonicLogistics functions as a pivotal downloader in PlushDaemon’s arsenal, operating as position-independent code executed in memory by LittleDaemon. Its primary objective is to retrieve and deploy the SlowStepper implant, a signature backdoor used for long-term access to compromised systems. The process begins with an HTTP GET request to the hijacking node, incorporating parameters that identify the operating system version and a unique client identifier, often derived from the machine’s MAC address. The server’s response, delivered as an HTTP status code, dictates the subsequent actions, ranging from direct payload downloads to conditional checks for security software presence, such as the 360tray.exe process associated with 360 Total Security. This adaptability in response handling showcases the group’s efforts to evade detection by tailoring actions based on the target environment.

Upon receiving the appropriate command, DaemonicLogistics downloads the SlowStepper files from URLs disguised as legitimate update paths, validating specific magic values in the data to ensure correct processing. The downloaded content is then saved to disk in deceptive locations, such as under directories mimicking trusted software vendors, and decrypted using XOR operations for execution. This meticulous approach to payload delivery and obfuscation ensures that the SlowStepper implant is installed with minimal visibility to standard security tools. The use of seemingly harmless file formats and paths further complicates detection efforts, as the malicious activity masquerades as routine system behavior. Understanding the operational nuances of DaemonicLogistics is crucial for developing countermeasures against such advanced downloaders.

6. Reflecting on PlushDaemon’s Global Impact

Looking back, the detailed analysis of EdgeStepper revealed how PlushDaemon orchestrated adversary-in-the-middle attacks by hijacking software updates, compromising network devices with surgical precision. The complementary roles of LittleDaemon and DaemonicLogistics in deploying the SlowStepper backdoor on Windows systems further amplified the group’s ability to infiltrate and persist within targeted environments. These tools collectively enabled attacks that spanned across continents, affecting diverse sectors from academia to manufacturing, and demonstrated a profound capability to undermine trust in routine software update processes. The scale and stealth of these operations posed significant challenges to cybersecurity defenses worldwide, often leaving victims unaware of the breach until substantial damage had occurred.

Moving forward, addressing the threat posed by PlushDaemon requires a multi-faceted approach focused on securing network infrastructure and enhancing update integrity. Organizations must prioritize patching vulnerabilities in network devices and enforcing strong, unique administrative credentials to prevent initial access. Implementing robust monitoring for anomalous DNS traffic and deploying endpoint detection solutions can help identify and mitigate the deployment of malicious payloads like LittleDaemon. Additionally, adopting secure update mechanisms, such as cryptographic verification of software downloads, could thwart hijacking attempts. Collaboration between cybersecurity researchers and industry stakeholders remains vital to share intelligence and develop proactive defenses against such sophisticated actors, ensuring that the digital landscape becomes increasingly resilient to covert espionage tactics.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later