EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate adversary-in-the-middle (AitM) attacks.
EdgeStepper “redirects all DNS queries to an external, malicious hijacking node, effectively rerouting the traffic from legitimate infrastructure used for software updates to attacker-controlled infrastructure

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts

Next Post

Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

Related Posts
Total
0
Share