Chinese group PlushDaemon uses the EdgeStepper implant to infect network devices with SlowStepper malware in global supply chain attacks.


  • China-aligned PlushDaemon deploys malware via compromised routers
  • PlushDaemon deploys LittleDaemon and DaemonLogistics on network devices
  • The final payload, SlowStepper, can execute commands and deploy spyware

Chinese hacking group PlushDaemon has been spotted by ESET targeting routers and other network devices with malware to launch supply chain attacks.

Cybersecurity experts note that the group has been active since 2018 and has so far deployed attacks against targets in the United States, New Zealand, Cambodia, Hong Kong, Taiwan and mainland China.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top