Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack

0
Medium
Malware
Published: Wed May 06 2026 (05/06/2026, 08:33:40 UTC)
Source: SecurityWeek

Description

While trojanized Daemon Tools versions were installed worldwide, a sophisticated backdoor was dropped only on a dozen systems. The post Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack appeared first on SecurityWeek .

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/06/2026, 08:36:32 UTC

Technical Analysis

Chinese-speaking threat actors conducted a supply chain attack by injecting malicious code into Daemon Tools versions 12.5.0.2421 to 12.5.0.2434, distributed via the official website. The compromised binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe) were signed with legitimate certificates and contained a backdoor activated at system startup. This backdoor communicated with a typosquatting domain to receive commands and deploy an information collector on thousands of machines across over 100 countries. Using collected data, attackers selectively infected about a dozen high-value targets in Belarus, Russia, and Thailand with a minimalistic backdoor and deployed the QUIC RAT malware on a Russian educational institution. The attack demonstrates a targeted, multi-stage approach leveraging supply chain compromise and signed binaries to evade detection.

Potential Impact

The attack compromised the integrity of Daemon Tools software, leading to widespread infection with an information-stealing backdoor on thousands of machines globally. Approximately 10% of infected systems belong to businesses and organizations. A small subset of high-value targets in government, scientific, manufacturing, and retail sectors were further compromised with a more advanced backdoor and additional malware, including QUIC RAT. This could enable espionage or targeted disruption. The use of signed binaries and legitimate distribution channels increases the risk of undetected compromise. No direct evidence of exploitation beyond infection and malware deployment is reported.

Mitigation Recommendations

No official patch or remediation guidance has been provided by AVB Disc Soft as of the current information. The vendor has been notified of the compromise. Organizations using Daemon Tools versions 12.5.0.2421 to 12.5.0.2434 should consider discontinuing use until official guidance or updates are released. Monitoring for unusual network activity related to typosquatting domains and command execution may help detect compromise. Given the supply chain nature of the attack, verifying software integrity and using alternative trusted sources for installation is recommended. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/government-scientific-entities-hit-via-daemon-tools-supply-chain-attack/","fetched":true,"fetchedAt":"2026-05-06T08:36:22.939Z","wordCount":1002}

Threat ID: 69fafd86cbff5d8610be9369

Added to database: 5/6/2026, 8:36:22 AM

Last enriched: 5/6/2026, 8:36:32 AM

Last updated: 5/7/2026, 8:18:54 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses