Chinese hackers compromise South Korean VPN — malicious code found inside NSIS installer

Fingerprint security
(Image credit: Pexels)

Chinese-linked hackers (via ESET Research) have reportedly compromised South Korean VPN provider IPany in a calculated supply chain attack that exposed numerous users to malware. The attackers infiltrated IPany’s software development pipeline, injecting malicious code into the NSIS installer for its Windows-based VPN application.

This sophisticated operation enabled the distribution of a custom backdoor, known as "SlowStepper," to unsuspecting users. It is another high-profile example of supply chain vulnerabilities being exploited for cyber espionage.

"The victims appear to have manually downloaded a ZIP archive containing a malicious NSIS installer from the URL https://ipany[.]kr/download/IPanyVPNsetup.zip," said ESET researcher Facundo Muñoz in the blog post.

Kunal Khullar
News Contributor

Kunal Khullar is a contributing writer at Tom’s Hardware.  He is a long time technology journalist and reviewer specializing in PC components and peripherals, and welcomes any and every question around building a PC.

  • greenreaper
    It came from China - another example of how VPNs can reduce security. If we're hearing about this provider, there are likely others that quietly kicked the problem under the rug - assuming they even noticed.
    Reply