← Back to BrewedIntel
adversaryhighAdversary-in-the-MiddleNetwork CompromisePlushDaemon

Nov 19, 2025 • ESET WeLiveSecurity

PlushDaemon compromises network devices for adversary-in-the-middle attacks

ESET researchers have uncovered a critical security incident involving the China-aligned advanced persistent threat group designated as PlushDaemon. This...

Source
ESET WeLiveSecurity
Category
adversary
Severity
high

Executive Summary

ESET researchers have uncovered a critical security incident involving the China-aligned advanced persistent threat group designated as PlushDaemon. This actor utilizes a custom network implant to compromise network devices, enabling adversary-in-the-middle attacks. This capability allows the interception and manipulation of network traffic, posing severe risks to data confidentiality and integrity across targeted infrastructures. The compromise of perimeter devices suggests a high-impact threat capable of facilitating extensive espionage or further network intrusion. Organizations should prioritize auditing network device integrity and enforcing strict access controls to mitigate these risks. Continuous monitoring for anomalous traffic patterns is essential to detect potential interception activities. This discovery underscores the persistent danger posed by state-sponsored actors targeting network infrastructure. Immediate defensive measures are necessary to safeguard sensitive communications and prevent unauthorized data exfiltration within affected enterprise environments.

Summary

ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks

Published Analysis

ESET researchers have uncovered a critical security incident involving the China-aligned advanced persistent threat group designated as PlushDaemon. This actor utilizes a custom network implant to compromise network devices, enabling adversary-in-the-middle attacks. This capability allows the interception and manipulation of network traffic, posing severe risks to data confidentiality and integrity across targeted infrastructures. The compromise of perimeter devices suggests a high-impact threat capable of facilitating extensive espionage or further network intrusion. Organizations should prioritize auditing network device integrity and enforcing strict access controls to mitigate these risks. Continuous monitoring for anomalous traffic patterns is essential to detect potential interception activities. This discovery underscores the persistent danger posed by state-sponsored actors targeting network infrastructure. Immediate defensive measures are necessary to safeguard sensitive communications and prevent unauthorized data exfiltration within affected enterprise environments. ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks

Linked Entities

  • PlushDaemon