The previously undocumented APT group, PlushDaemon, carried out a 2023 cyber espionage operation against South Korean VPN software. The threat was detected by ESET, who found the malware-infected installer for the IPany VPN on the developer’s website. The malicious software, SlowStepper, is a feature-rich backdoor designed for extensive surveillance and data collection. Victims included entities across South Korea, China, and Japan. ESET has reported that the incident demonstrates the risk posed by targeted cyber espionage campaigns against critical industries.
NY Attorney General James Secures Court Victory to Proceed with Lawsuit Against Citibank, Reports DataBreaches.Net
Well, it’s not every day you hear this kind of news, but it sure stirs up conversation, right? Did you know about this whole business