Jump to content
  • Sign Up
×
×
  • Create New...

Chinese hackers compromise South Korean VPN — malicious code found inside NSIS installer


Recommended Posts

  • Diamond Member

This is the hidden content, please

******** hackers compromise South Korean VPN — malicious code found inside NSIS installer

This is the hidden content, please

********-linked hackers (via

This is the hidden content, please
) have reportedly compromised South Korean VPN provider IPany in a calculated supply chain attack that exposed numerous users to malware. The attackers infiltrated IPany’s software development pipeline, injecting malicious code into the NSIS installer for its Windows-based VPN application.

This sophisticated operation enabled the distribution of a custom *********, known as “SlowStepper,” to unsuspecting users. It is another high-profile example of supply chain vulnerabilities being exploited for cyber espionage.

The breach was initially uncovered in May 2024 by researchers from Slovak-based cybersecurity firm ESET revealed the breach in May 2024. They identified the altered installer being served directly from IPany’s official website. The attackers tampered with the installer to include the SlowStepper *********. This modular malware allows attackers to exfiltrate sensitive data, execute commands, and maintain long-term persistence on compromised systems. Users downloading what appeared to be legitimate software updates inadvertently exposed their systems to the *********, granting the attackers significant control over their devices.

“The victims appear to have manually downloaded a ZIP archive containing a malicious NSIS installer from the URL https://ipany[.]kr/download/IPanyVPNsetup.zip,” said ESET researcher Facundo Muñoz in the blog post.

The group behind this attack, PlushDaemon, is a ******** advanced persistent threat (APT) actor that has been active since at least 2019. PlushDaemon is known for ********** legitimate software distribution channels to deliver malicious payloads. In this case, they accessed IPany’s software repository, altered the installer, and ensured it was distributed through official channels. Their tactics include redirecting legitimate traffic to attacker-controlled servers to deliver malicious updates, a hallmark of supply chain compromise.

China has several active APT groups engaged in persistent cyber espionage against the US and its allies. Recently, ******** APT Salt Typhoon infiltrated US broadband provider networks, but the investigation faced setbacks when President Trump fired the cyber safety board overseeing it.

Meanwhile, the emergence of PlushDaemon, a new and sophisticated China-aligned APT group with a diverse toolset and a long operational history, highlights the growing cyber threat. Experts urge organizations to remain vigilant against increasingly advanced malicious activity. The breach at IPany is also a stark reminder that even widely trusted providers are vulnerable to cyber-attacks, necessitating a proactive approach to security.

Get Tom’s Hardware’s best news and in-depth reviews, straight to your inbox.



This is the hidden content, please

#******** #hackers #compromise #South #Korean #VPN #malicious #code #NSIS #installer

This is the hidden content, please

This is the hidden content, please

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.