Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The AI Hard Drive Shortage Is Making It More Expensive and Harder to Archive the Internet

    May 5, 2026

    ZDI-26-137: Trend Micro Apex One Console Directory Traversal Remote Code Execution Vulnerability

    May 5, 2026

    ABB B&R Automation Runtime | CISA

    May 5, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»DAEMON Tools trojanized in supply-chain attack to deploy backdoor
    News

    DAEMON Tools trojanized in supply-chain attack to deploy backdoor

    adminBy adminMay 5, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    DAEMON Tools trojanized in supply-chain attack to deploy backdoor

    Hackers trojanized installers for the DAEMON Tools software and since April 8, delivered a backdoor to thousands of systems that downloaded the product from the official website.

    The supply-chain attack led to thousands of infections in more than 100 countries. However, second-stage payloads were deployed only to a dozen machines, indicating a targeted attack aimed at high-value targets.

    Among the victims receiving next-stage payloads are retail, scientific, government, and manufacturing organizations in Russia, Belarus, and Thailand.

    A report today from cybersecurity company Kaspersky notes that the attack is ongoing and that trojanized software includes DAEMON Tools versions from 12.5.0.2421 through 12.5.0.2434, specifically the DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe binaries.

    DAEMON Tools is a Windows utility that allows mounting disk image files as virtual drives. The software was extremely popular in the 2000s, especially among gamers and power users, but today its deployment is limited to environments where virtual drive management is required.

    As of today, Kaspersky says that the attack is ongoing.

    Once unsuspecting users download and execute the digitally signed trojanized installers, they trigger the malicious code embedded in the compromised binaries. The payload establishes persistence and activates a backdoor on system startup.

    The server can respond with commands that instruct the system to download and execute additional payloads.

    The first-stage malware is a basic information stealer that collects system data, such as hostname, MAC address, running processes, installed software, and system locale, and sends them to the attackers for victim profiling.

    Basic info-stealer
    Basic info-stealer payload
    Source: Kaspersky

    Based on the results, some systems receive a second stage, which is a lightweight backdoor that can execute commands, download files, and run code directly in memory.

    Code snippet from the backdoor
    Code snippet from the backdoor
    Source: Kaspersky

    In at least one case targeting a Russian educational institute, Kaspersky observed the deployment of a more advanced malware strain dubbed QUIC RAT, which supports multiple communication protocols and can inject malicious code into legitimate processes.

    BleepingComputer has contacted DAEMON Tools with a request for a comment on the supply chain attack, but we have not heard back by publication.

    Kaspersky describes the DAEMON Tools supply-chain attack as a sufficiently sophisticated compromise that evaded detection for almost one month.

    “Given the high complexity of the attack, it is paramount for organizations to carefully examine machines that had DAEMON Tools installed, for abnormal cybersecurity-related activities that occurred on or after April 8,” the researchers say.

    Although Kaspersky does not attribute the attack to a particular threat actor, based on strings found in the first-stage payload, the researchers believe that the attacker is Chinese speaking.

    Since the beginning of the year, software supply-chain attacks have been detected almost every month: eScan in January, Notepad++ in February, CPU-Z in April, and DAEMON Tools this month.

    Similar attacks targeting code repositories, packages, and extensions have been even more prevalent this year, with Trivy, Checkmarx, and the Glassworm campaigns being among the most prominent.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCVE-2026-40280 | THREATINT
    Next Article ABB B&R Automation Runtime | CISA
    admin
    • Website

    Related Posts

    News

    The AI Hard Drive Shortage Is Making It More Expensive and Harder to Archive the Internet

    May 5, 2026
    News

    UK iPhone and iPad Users Can Watch Porn Again

    May 5, 2026
    News

    InfoSec News Nuggets 05/05/2026

    May 5, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202674 Views

    The Essential Guide to Removing Computer Infections: Step-by-Step Remedies

    March 20, 202620 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202674 Views

    The Essential Guide to Removing Computer Infections: Step-by-Step Remedies

    March 20, 202620 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views
    Our Picks

    The AI Hard Drive Shortage Is Making It More Expensive and Harder to Archive the Internet

    May 5, 2026

    ZDI-26-137: Trend Micro Apex One Console Directory Traversal Remote Code Execution Vulnerability

    May 5, 2026

    ABB B&R Automation Runtime | CISA

    May 5, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.