Security researchers from ESET have discovered a sophisticated toolset used by PlushDaemon, a China-aligned Advanced Persistent Threat (APT) group. The key component is a previously unknown network implant named EdgeStepper, which is designed to conduct adversary-in-the-middle (AitM) attacks at the network level. By compromising network devices, PlushDaemon uses EdgeStepper to hijack legitimate software update traffic, allowing them to covertly deploy additional malware onto target machines. The full attack chain involves other custom tools, including LittleDaemon, DaemonicLogistics, and the final Windows payload, SlowStepper. This discovery highlights the advanced capabilities of the threat group to achieve persistent, stealthy access into target environments globally.
T1657 - Financial Theft) at the network layer, specifically targeting software updates, which is a form of Supply Chain Compromise (T1195.001 - Compromise Software Supply Chain).The attack framework employed by PlushDaemon is complex and demonstrates a high level of sophistication, focusing on compromising network infrastructure to gain a powerful strategic advantage.
Detecting this activity is challenging and requires deep network analysis:
| Type | Value | Description |
|---|---|---|
| network_traffic_pattern | Anomalous DNS responses for update servers |
Monitor for DNS responses for legitimate update servers (e.g., update.microsoft.com) that resolve to unexpected or internal IP addresses. |
| certificate_subject | Self-signed or mismatched SSL certificates |
If the AitM attack involves HTTPS traffic, it may present an invalid SSL certificate. Certificate pinning failures could be an indicator. |
| file_hash_sha256 | Hashes for SlowStepper |
Once security vendors publish hashes for the SlowStepper implant, they can be used for endpoint scanning. |
| network_traffic_pattern | Unencrypted HTTP for updates |
Monitor for software updates being downloaded over unencrypted HTTP, as this is easier to hijack. |
D3-NTA - Network Traffic Analysis is paramount.D3-CP - Certificate Pinning.M1045 - Code Signing).Enforcing that only executables with valid digital signatures from trusted vendors can be run would prevent the malicious SlowStepper payload from executing.
Inspecting TLS traffic can help detect certificate anomalies indicative of an AitM attack.
Mapped D3FEND Techniques:
Hardening network device operating systems by patching, changing default credentials, and disabling unused services makes the initial compromise more difficult.
Mapped D3FEND Techniques:
To defeat network-level hijacking like the EdgeStepper implant, organizations should enforce Certificate Pinning for critical applications, especially software updaters. Certificate Pinning is a mechanism that tells a client application to only trust a specific, pre-defined server certificate or public key. When the PlushDaemon implant intercepts the update traffic and presents its own fraudulent certificate, the client application will immediately detect the mismatch, reject the connection, and prevent the malicious SlowStepper payload from being downloaded. This control effectively breaks the adversary-in-the-middle attack by creating a trusted, unbreakable link between the endpoint and the legitimate update server, rendering traffic interception useless.
Detecting an implant like EdgeStepper requires deep Network Traffic Analysis. Security teams should use tools like Zeek or other Network Detection and Response (NDR) platforms to monitor for subtle indicators of compromise. Key patterns to hunt for include: DNS requests for well-known update servers (e.g., windowsupdate.com) that are answered with internal or unexpected IP addresses; a sudden increase in TLS/SSL certificate errors across the network; and network devices initiating unusual outbound connections. By establishing a baseline of normal network behavior, these anomalies, which are hallmarks of AitM and traffic redirection, can be surfaced as high-confidence alerts, pointing directly to a compromised network device.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats