Chinese hackers compromise South Korean VPN — malicious code found inside NSIS installer

Fingerprint security
(Image credit: Pexels)

Chinese-linked hackers (via ESET Research) have reportedly compromised South Korean VPN provider IPany in a calculated supply chain attack that exposed numerous users to malware. The attackers infiltrated IPany’s software development pipeline, injecting malicious code into the NSIS installer for its Windows-based VPN application.

This sophisticated operation enabled the distribution of a custom backdoor, known as "SlowStepper," to unsuspecting users. It is another high-profile example of supply chain vulnerabilities being exploited for cyber espionage.

The breach was initially uncovered in May 2024 by researchers from Slovak-based cybersecurity firm ESET revealed the breach in May 2024. They identified the altered installer being served directly from IPany’s official website. The attackers tampered with the installer to include the SlowStepper backdoor. This modular malware allows attackers to exfiltrate sensitive data, execute commands, and maintain long-term persistence on compromised systems. Users downloading what appeared to be legitimate software updates inadvertently exposed their systems to the backdoor, granting the attackers significant control over their devices.

"The victims appear to have manually downloaded a ZIP archive containing a malicious NSIS installer from the URL https://ipany[.]kr/download/IPanyVPNsetup.zip," said ESET researcher Facundo Muñoz in the blog post.

The group behind this attack, PlushDaemon, is a Chinese advanced persistent threat (APT) actor that has been active since at least 2019. PlushDaemon is known for hijacking legitimate software distribution channels to deliver malicious payloads. In this case, they accessed IPany’s software repository, altered the installer, and ensured it was distributed through official channels. Their tactics include redirecting legitimate traffic to attacker-controlled servers to deliver malicious updates, a hallmark of supply chain compromise.

China has several active APT groups engaged in persistent cyber espionage against the US and its allies. Recently, Chinese APT Salt Typhoon infiltrated US broadband provider networks, but the investigation faced setbacks when President Trump fired the cyber safety board overseeing it.

Meanwhile, the emergence of PlushDaemon, a new and sophisticated China-aligned APT group with a diverse toolset and a long operational history, highlights the growing cyber threat. Experts urge organizations to remain vigilant against increasingly advanced malicious activity. The breach at IPany is also a stark reminder that even widely trusted providers are vulnerable to cyber-attacks, necessitating a proactive approach to security.

Kunal Khullar
News Contributor

Kunal Khullar is a contributing writer at Tom’s Hardware.  He is a long time technology journalist and reviewer specializing in PC components and peripherals, and welcomes any and every question around building a PC.

Read more
US Capitol Building
Significant U.S. Treasury cybersecurity breach is the latest in string of China hack attacks claims U.S. officials
Contec CMS-8000
Backdoor uncovered in China-made patient monitors — Contec CMS8000 raises questions about healthcare device security
Guam harbor
U.S. uncovers hacking campaign targeting Guam's critical infrastructure — suspected Chinese Volt Typhoon hacks could disrupt the defense of Taiwan
Crypto Hacker
Chinese hackers infiltrated US Treasury Secretary's PC — attackers had access to over 400 PCs
A security specialist
Chinese hackers target US Treasury computers used for sanctions — Committee on Foreign Investment specifically targeted
severed submarine internet cable
Chinese freighter suspected of damaging undersea Internet cable connecting the US and Taiwan
Latest in Cyber Security
GeForce RTX 3090
Akira ransomware can be cracked with 16 RTX 4090 GPUs in around ten hours — new counterattack breaks encryption
Crypto Hacker
FBI identifies North Korea as source of $1.5 billion ByBit hack
A broken lock on a PCB.
Apartment buildings broken into with phone in minutes — IoT-connected intercoms using default creds vulnerable to anyone with Google
Streamjackers want your digital treasures
CS2 fans targeted by Streamjackers — viewers swindled out of crypto and Steam valuables
Eight Sleep's Pod 4 Ultra Smart Bed
Security researcher finds vulnerability in internet-connected bed, could allow access to all devices on network
13th Generation Intel CPU
Intel roasts AMD and Nvidia in its latest product security report, claiming AMD has vulnerabilities with no fix planned, Nvidia has only high-severity security bugs [Updated]
Latest in News
RX 9070 XT Sapphire
Lisa Su says Radeon RX 9070-series GPU sales are 10X higher than its predecessors — for the first week of availability
RTX 5070, RX 9070 XT, Arc B580
Real-world GPU prices cost up to twice the MSRP — a look at current FPS per dollar values
Zotac Gaming GeForce RTX 5090 AMP Extreme Infinity
Zotac raises RTX 5090 prices by 20% and seemingly eliminates MSRP models
ASRock fixes AM5 motherboard by cleaning it
ASRock claims to fix 'burned out' AM5 motherboard by cleaning the socket
ChatGPT Security
Some ChatGPT users are addicted and will suffer withdrawal symptoms if cut off, say researchers
project-g-assist-nvidia-geforce-rtx-ogimage
Nvidia releases public G-Assist in latest App to provide in-game AI assistance — also introduces DLSS custom scaling factors
  • greenreaper
    It came from China - another example of how VPNs can reduce security. If we're hearing about this provider, there are likely others that quietly kicked the problem under the rug - assuming they even noticed.
    Reply