Diamond Member Pelican Press 0 Posted January 23 Diamond Member Share Posted January 23 This is the hidden content, please Sign In or Sign Up ******** hackers compromise South Korean VPN — malicious code found inside NSIS installer This is the hidden content, please Sign In or Sign Up ********-linked hackers (via This is the hidden content, please Sign In or Sign Up ) have reportedly compromised South Korean VPN provider IPany in a calculated supply chain attack that exposed numerous users to malware. The attackers infiltrated IPany’s software development pipeline, injecting malicious code into the NSIS installer for its Windows-based VPN application. This sophisticated operation enabled the distribution of a custom *********, known as “SlowStepper,” to unsuspecting users. It is another high-profile example of supply chain vulnerabilities being exploited for cyber espionage. The breach was initially uncovered in May 2024 by researchers from Slovak-based cybersecurity firm ESET revealed the breach in May 2024. They identified the altered installer being served directly from IPany’s official website. The attackers tampered with the installer to include the SlowStepper *********. This modular malware allows attackers to exfiltrate sensitive data, execute commands, and maintain long-term persistence on compromised systems. Users downloading what appeared to be legitimate software updates inadvertently exposed their systems to the *********, granting the attackers significant control over their devices. “The victims appear to have manually downloaded a ZIP archive containing a malicious NSIS installer from the URL https://ipany[.]kr/download/IPanyVPNsetup.zip,” said ESET researcher Facundo Muñoz in the blog post. The group behind this attack, PlushDaemon, is a ******** advanced persistent threat (APT) actor that has been active since at least 2019. PlushDaemon is known for ********** legitimate software distribution channels to deliver malicious payloads. In this case, they accessed IPany’s software repository, altered the installer, and ensured it was distributed through official channels. Their tactics include redirecting legitimate traffic to attacker-controlled servers to deliver malicious updates, a hallmark of supply chain compromise. China has several active APT groups engaged in persistent cyber espionage against the US and its allies. Recently, ******** APT Salt Typhoon infiltrated US broadband provider networks, but the investigation faced setbacks when President Trump fired the cyber safety board overseeing it. Meanwhile, the emergence of PlushDaemon, a new and sophisticated China-aligned APT group with a diverse toolset and a long operational history, highlights the growing cyber threat. Experts urge organizations to remain vigilant against increasingly advanced malicious activity. The breach at IPany is also a stark reminder that even widely trusted providers are vulnerable to cyber-attacks, necessitating a proactive approach to security. Get Tom’s Hardware’s best news and in-depth reviews, straight to your inbox. This is the hidden content, please Sign In or Sign Up #******** #hackers #compromise #South #Korean #VPN #malicious #code #NSIS #installer This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/197542-chinese-hackers-compromise-south-korean-vpn-%E2%80%94-malicious-code-found-inside-nsis-installer/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now