PlushDaemon compromises network devices for adversary-in-the-middle attacks
ATT&CK techniques detected
T1195.002Compromise Software Supply Chain
84%
“to hijack legitimate updates by redirecting traffic to attacker - controlled servers through a network implant that we call edgestepper. additionally, we have observed the group gaining access via vulnerabilities in web servers, and in 2023 it performed a supply - chain attack. o…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1105Ingress Tool Transfer
57%
“##mon is the first stage deployed on the victim ’ s machine through hijacked updates. we have observed both dll and executable versions, both of them 32 - bit pes. the main purpose of littledaemon is to communicate with the hijacking node to obtain the downloader that we call dae…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1572Protocol Tunneling
56%
“then it forwards the packet to the malicious dns node. - finally, it forwards the reply from the dns node to the device. ruler the ruler system uses the iptables command to issue new rules, and to remove them when concluding the attack. first, it issues a rule to redirect all udp…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
40%
“##mon is the first stage deployed on the victim ’ s machine through hijacked updates. we have observed both dll and executable versions, both of them 32 - bit pes. the main purpose of littledaemon is to communicate with the hijacking node to obtain the downloader that we call dae…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks