6.2 C
London
Thursday, January 23, 2025
HomeTechnologyCyber SecurityChinese Hackers Compromise VPN Website to Spread Malware

Chinese Hackers Compromise VPN Website to Spread Malware

Date:

Related stories

Antitrust Probes Into Apple and Google’s Mobile Ecosystems

The UK has launched antitrust probes into Apple and Google, investigating whether their dominance in the mobile ecosystem stifles competition and harms consumers and businesses.

South Africans to Gain Advanced Tech Skills by 2026

South Africans are set to benefit from a major tech skills initiative, with 1 million individuals targeted for AI and cybersecurity training by 2026.

ByteDance AI Investments: $20 Billion Capex Planned for 2025

ByteDance, the owner of TikTok, is set to invest $20 billion in AI infrastructure in 2025. Half of this investment will target overseas expansion, bolstering its position as an AI leader.

Visa Invests in Moniepoint, Fueling Growth in African Fintech

Visa has made a strategic investment in Moniepoint, a...

Netflix Experiences Significant Growth in Q4 2024

Netflix has announced a remarkable surge in subscribers, adding...
spot_imgspot_img

Chinese Hackers Compromise VPN Website to Spread Malware: A recent cybersecurity threat has been uncovered by antivirus company ESET, revealing that Chinese hackers hijacked the website of IPany, a South Korean VPN provider, to spread malware to users in Asia.

Malware Infection and Removal

In May 2024, ESET’s antivirus software detected malware infections on Windows computers traced back to IPany’s website.

Further analysis revealed that the installer was deploying both the legitimate VPN software and a backdoor malware, dubbed Slow stepper.

Chinese Hackers Compromise VPN Website to Spread Malware
Image credit: Pcmag

Scope of the Attack

The compromised website did not contain any code to target specific users based on their geographic region or IP address. As a result, ESET warns that anyone using the IPany VPN might have been a potential target.

Attribution and Motivation

ESET attributed the attack to a Chinese hacking group known as PlushDemon, which has been active since 2019, conducting cyber espionage in China, Taiwan, South Korea, and the US.

The company’s telemetry data revealed that several users attempted to install the trojanized software in the networks of a semiconductor company and a software development company in South Korea.

Additional victims were identified in Japan and China, dating back to November and December 2023, respectively.

Mitigation and Prevention

To protect themselves from similar attacks, Users are advised to exercise caution when downloading software from the internet.

Ensure their antivirus software is up-to-date, and monitor their systems for suspicious activity.

The numerous components in the PlushDaemon toolset, and its rich version history, show that, while previously unknown, this China-aligned APT group has been operating diligently to develop a wide array of tools, making it a significant threat to watch for,” ESET said.

Tochukwu Ugwu
Tochukwu Ugwuhttps://techpolyp.com/
Tochukwu Ugwu is a reporter at TechPolyp with a special interest in artificial intelligence. Prior to joining TechPolyp, he has earned numerous awards in AI journalism.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here