Nov 19, 2025 • ESET WeLiveSecurity
PlushDaemon compromises network devices for adversary-in-the-middle attacks
ESET researchers have uncovered a critical security incident involving the China-aligned advanced persistent threat group designated as PlushDaemon. This...
Executive Summary
ESET researchers have uncovered a critical security incident involving the China-aligned advanced persistent threat group designated as PlushDaemon. This actor utilizes a custom network implant to compromise network devices, enabling adversary-in-the-middle attacks. This capability allows the interception and manipulation of network traffic, posing severe risks to data confidentiality and integrity across targeted infrastructures. The compromise of perimeter devices suggests a high-impact threat capable of facilitating extensive espionage or further network intrusion. Organizations should prioritize auditing network device integrity and enforcing strict access controls to mitigate these risks. Continuous monitoring for anomalous traffic patterns is essential to detect potential interception activities. This discovery underscores the persistent danger posed by state-sponsored actors targeting network infrastructure. Immediate defensive measures are necessary to safeguard sensitive communications and prevent unauthorized data exfiltration within affected enterprise environments.
Summary
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
Published Analysis
ESET researchers have uncovered a critical security incident involving the China-aligned advanced persistent threat group designated as PlushDaemon. This actor utilizes a custom network implant to compromise network devices, enabling adversary-in-the-middle attacks. This capability allows the interception and manipulation of network traffic, posing severe risks to data confidentiality and integrity across targeted infrastructures. The compromise of perimeter devices suggests a high-impact threat capable of facilitating extensive espionage or further network intrusion. Organizations should prioritize auditing network device integrity and enforcing strict access controls to mitigate these risks. Continuous monitoring for anomalous traffic patterns is essential to detect potential interception activities. This discovery underscores the persistent danger posed by state-sponsored actors targeting network infrastructure. Immediate defensive measures are necessary to safeguard sensitive communications and prevent unauthorized data exfiltration within affected enterprise environments. ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
Linked Entities
- PlushDaemon