Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Popular DAEMON Tools software compromised

0
Medium
Published: Tue May 05 2026 (05/05/2026, 14:23:42 UTC)
Source: AlienVault OTX General

Description

Since April 8, 2026, installers of DAEMON Tools software have been compromised with malicious payloads distributed through the legitimate website. Versions 12.5.0.2421 to 12.5.0.2434 contain trojaned binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe) signed with legitimate developer certificates. The attack has affected thousands of systems across over 100 countries, though advanced payloads were selectively deployed to approximately a dozen machines in government, scientific, manufacturing, and retail organizations. Initial infection establishes backdoor communications to typosquatted domains, followed by deployment of an information collector for system profiling. Targeted systems receive additional implants including a minimalistic backdoor and QUIC RAT. Chinese-language strings found in malicious components suggest a Chinese-speaking threat actor. The attack remains active at time of publication, demonstrating sophisticated supply chain compromise techniques comparable to the 2023 3CX ...

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/05/2026, 16:21:32 UTC

Technical Analysis

This threat involves a supply chain compromise of DAEMON Tools software installers between versions 12.5.0.2421 and 12.5.0.2434, distributed via the legitimate website starting April 8, 2026. The compromised installers contain trojanized binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe) signed with valid developer certificates, allowing the malware to evade detection. The initial infection establishes backdoor communications to attacker-controlled typosquatted domains and deploys an information collector for system profiling. Select targeted systems receive additional implants, including a minimalistic backdoor and a QUIC RAT, enabling remote access and control. The presence of Chinese-language strings indicates a likely Chinese-speaking threat actor. The attack is ongoing and affects thousands of systems globally, with advanced payloads deployed selectively to a limited number of high-value targets in government, scientific, manufacturing, and retail sectors. This incident demonstrates advanced supply chain attack techniques similar to those seen in the 2023 3CX compromise. No patch or official remediation has been published at this time.

Potential Impact

The compromise of DAEMON Tools installers has led to widespread infection of thousands of systems worldwide. The trojanized binaries enable attackers to establish persistent backdoor access and collect system information. Targeted organizations face additional risks from advanced implants, including remote access trojans, which could lead to espionage or data theft. The use of legitimate developer certificates increases the likelihood of successful infection and evasion of security controls. The ongoing nature of the attack and its selective targeting of sensitive sectors heighten the potential impact on critical infrastructure and intellectual property. No known exploits beyond this supply chain compromise have been reported.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix or update is released by DAEMON Tools, organizations should avoid installing or updating to versions 12.5.0.2421 through 12.5.0.2434 from the official website. Where possible, verify installer integrity using trusted sources or hashes. Monitor for indicators of compromise such as the listed malicious file hashes and network connections to typosquatted domains. Remove affected versions and reinstall clean software from a verified source once remediation is available. Follow vendor communications closely for updates on patches or official mitigation steps.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://securelist.com/tr/daemon-tools-backdoor/119654/"]
Adversary
null
Pulse Id
69f9fd6e0328f7a1be1faa20
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hasha916e56121212613d17932e124b68752c9312e73bde8f2351054bd64394257df
hash12edcaafab7703d0819b1395f45c35e3083dd83fb8b128292cb11033453fb6e8
hash8c67ae3b4b8d30d13a8118701134d94e
hasha7f6308f3c7624a603e2242b19a0a8e7
hashf2bd550773af344661689e259ffb97ed
hash0c1d3da9c7a651ba40b40e12d48ebd32b3f31820
hash15ed5c3384e12fe4314ad6edbd1dcccf5ac1ee29
hash28b72576d67ae21d9587d782942628ea46dcc870
hash2d4eb55b01f59c62c6de9aacba9b47267d398fe4
hash46b90bf370e60d61075d3472828fdc0b85ab0492
hash50d47adb6dd45215c7cb4c68bae28b129ca09645
hash524d2d92909eef80c406e87a0fc37d7bb4dadc14
hash6325179f442e5b1a716580cd70dea644ac9ecd18
hash64462f751788f529c1eb09023b26a47792ecdc54
hash8e7eb0f5ac60dd3b4a9474d2544348c3bda48045
hash9a09ad7b7e9ff7a465aa1150541e231189911afb
hash9ccd769624de98eeeb12714ff1707ec4f5bf196d
hash9dbfc23ebf36b3c0b56d2f93116abb32656c42e4
hashaea55e42c4436236278e5692d3dcbcbe5fe6ce0b
hashbd8fbb5e6842df8683163adbd6a36136164eac58
hashd2a5c9cbb73849cc0667987c33a9bf3822718e1528faef005f1628de3348ffb0

Threat ID: 69fa157fcbff5d86100eace9

Added to database: 5/5/2026, 4:06:23 PM

Last enriched: 5/5/2026, 4:21:32 PM

Last updated: 5/6/2026, 3:54:35 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses