Popular DAEMON Tools software compromised
Since April 8, 2026, installers of DAEMON Tools software have been compromised with malicious payloads distributed through the legitimate website. Versions 12.5.0.2421 to 12.5.0.2434 contain trojaned binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe) signed with legitimate developer certificates. The attack has affected thousands of systems across over 100 countries, though advanced payloads were selectively deployed to approximately a dozen machines in government, scientific, manufacturing, and retail organizations. Initial infection establishes backdoor communications to typosquatted domains, followed by deployment of an information collector for system profiling. Targeted systems receive additional implants including a minimalistic backdoor and QUIC RAT. Chinese-language strings found in malicious components suggest a Chinese-speaking threat actor. The attack remains active at time of publication, demonstrating sophisticated supply chain compromise techniques comparable to the 2023 3CX ...
AI Analysis
Technical Summary
This threat involves a supply chain compromise of DAEMON Tools software installers between versions 12.5.0.2421 and 12.5.0.2434, distributed via the legitimate website starting April 8, 2026. The compromised installers contain trojanized binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe) signed with valid developer certificates, allowing the malware to evade detection. The initial infection establishes backdoor communications to attacker-controlled typosquatted domains and deploys an information collector for system profiling. Select targeted systems receive additional implants, including a minimalistic backdoor and a QUIC RAT, enabling remote access and control. The presence of Chinese-language strings indicates a likely Chinese-speaking threat actor. The attack is ongoing and affects thousands of systems globally, with advanced payloads deployed selectively to a limited number of high-value targets in government, scientific, manufacturing, and retail sectors. This incident demonstrates advanced supply chain attack techniques similar to those seen in the 2023 3CX compromise. No patch or official remediation has been published at this time.
Potential Impact
The compromise of DAEMON Tools installers has led to widespread infection of thousands of systems worldwide. The trojanized binaries enable attackers to establish persistent backdoor access and collect system information. Targeted organizations face additional risks from advanced implants, including remote access trojans, which could lead to espionage or data theft. The use of legitimate developer certificates increases the likelihood of successful infection and evasion of security controls. The ongoing nature of the attack and its selective targeting of sensitive sectors heighten the potential impact on critical infrastructure and intellectual property. No known exploits beyond this supply chain compromise have been reported.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix or update is released by DAEMON Tools, organizations should avoid installing or updating to versions 12.5.0.2421 through 12.5.0.2434 from the official website. Where possible, verify installer integrity using trusted sources or hashes. Monitor for indicators of compromise such as the listed malicious file hashes and network connections to typosquatted domains. Remove affected versions and reinstall clean software from a verified source once remediation is available. Follow vendor communications closely for updates on patches or official mitigation steps.
Indicators of Compromise
- hash: a916e56121212613d17932e124b68752c9312e73bde8f2351054bd64394257df
- hash: 12edcaafab7703d0819b1395f45c35e3083dd83fb8b128292cb11033453fb6e8
- hash: 8c67ae3b4b8d30d13a8118701134d94e
- hash: a7f6308f3c7624a603e2242b19a0a8e7
- hash: f2bd550773af344661689e259ffb97ed
- hash: 0c1d3da9c7a651ba40b40e12d48ebd32b3f31820
- hash: 15ed5c3384e12fe4314ad6edbd1dcccf5ac1ee29
- hash: 28b72576d67ae21d9587d782942628ea46dcc870
- hash: 2d4eb55b01f59c62c6de9aacba9b47267d398fe4
- hash: 46b90bf370e60d61075d3472828fdc0b85ab0492
- hash: 50d47adb6dd45215c7cb4c68bae28b129ca09645
- hash: 524d2d92909eef80c406e87a0fc37d7bb4dadc14
- hash: 6325179f442e5b1a716580cd70dea644ac9ecd18
- hash: 64462f751788f529c1eb09023b26a47792ecdc54
- hash: 8e7eb0f5ac60dd3b4a9474d2544348c3bda48045
- hash: 9a09ad7b7e9ff7a465aa1150541e231189911afb
- hash: 9ccd769624de98eeeb12714ff1707ec4f5bf196d
- hash: 9dbfc23ebf36b3c0b56d2f93116abb32656c42e4
- hash: aea55e42c4436236278e5692d3dcbcbe5fe6ce0b
- hash: bd8fbb5e6842df8683163adbd6a36136164eac58
- hash: d2a5c9cbb73849cc0667987c33a9bf3822718e1528faef005f1628de3348ffb0
Popular DAEMON Tools software compromised
Description
Since April 8, 2026, installers of DAEMON Tools software have been compromised with malicious payloads distributed through the legitimate website. Versions 12.5.0.2421 to 12.5.0.2434 contain trojaned binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe) signed with legitimate developer certificates. The attack has affected thousands of systems across over 100 countries, though advanced payloads were selectively deployed to approximately a dozen machines in government, scientific, manufacturing, and retail organizations. Initial infection establishes backdoor communications to typosquatted domains, followed by deployment of an information collector for system profiling. Targeted systems receive additional implants including a minimalistic backdoor and QUIC RAT. Chinese-language strings found in malicious components suggest a Chinese-speaking threat actor. The attack remains active at time of publication, demonstrating sophisticated supply chain compromise techniques comparable to the 2023 3CX ...
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a supply chain compromise of DAEMON Tools software installers between versions 12.5.0.2421 and 12.5.0.2434, distributed via the legitimate website starting April 8, 2026. The compromised installers contain trojanized binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe) signed with valid developer certificates, allowing the malware to evade detection. The initial infection establishes backdoor communications to attacker-controlled typosquatted domains and deploys an information collector for system profiling. Select targeted systems receive additional implants, including a minimalistic backdoor and a QUIC RAT, enabling remote access and control. The presence of Chinese-language strings indicates a likely Chinese-speaking threat actor. The attack is ongoing and affects thousands of systems globally, with advanced payloads deployed selectively to a limited number of high-value targets in government, scientific, manufacturing, and retail sectors. This incident demonstrates advanced supply chain attack techniques similar to those seen in the 2023 3CX compromise. No patch or official remediation has been published at this time.
Potential Impact
The compromise of DAEMON Tools installers has led to widespread infection of thousands of systems worldwide. The trojanized binaries enable attackers to establish persistent backdoor access and collect system information. Targeted organizations face additional risks from advanced implants, including remote access trojans, which could lead to espionage or data theft. The use of legitimate developer certificates increases the likelihood of successful infection and evasion of security controls. The ongoing nature of the attack and its selective targeting of sensitive sectors heighten the potential impact on critical infrastructure and intellectual property. No known exploits beyond this supply chain compromise have been reported.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix or update is released by DAEMON Tools, organizations should avoid installing or updating to versions 12.5.0.2421 through 12.5.0.2434 from the official website. Where possible, verify installer integrity using trusted sources or hashes. Monitor for indicators of compromise such as the listed malicious file hashes and network connections to typosquatted domains. Remove affected versions and reinstall clean software from a verified source once remediation is available. Follow vendor communications closely for updates on patches or official mitigation steps.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securelist.com/tr/daemon-tools-backdoor/119654/"]
- Adversary
- null
- Pulse Id
- 69f9fd6e0328f7a1be1faa20
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hasha916e56121212613d17932e124b68752c9312e73bde8f2351054bd64394257df | — | |
hash12edcaafab7703d0819b1395f45c35e3083dd83fb8b128292cb11033453fb6e8 | — | |
hash8c67ae3b4b8d30d13a8118701134d94e | — | |
hasha7f6308f3c7624a603e2242b19a0a8e7 | — | |
hashf2bd550773af344661689e259ffb97ed | — | |
hash0c1d3da9c7a651ba40b40e12d48ebd32b3f31820 | — | |
hash15ed5c3384e12fe4314ad6edbd1dcccf5ac1ee29 | — | |
hash28b72576d67ae21d9587d782942628ea46dcc870 | — | |
hash2d4eb55b01f59c62c6de9aacba9b47267d398fe4 | — | |
hash46b90bf370e60d61075d3472828fdc0b85ab0492 | — | |
hash50d47adb6dd45215c7cb4c68bae28b129ca09645 | — | |
hash524d2d92909eef80c406e87a0fc37d7bb4dadc14 | — | |
hash6325179f442e5b1a716580cd70dea644ac9ecd18 | — | |
hash64462f751788f529c1eb09023b26a47792ecdc54 | — | |
hash8e7eb0f5ac60dd3b4a9474d2544348c3bda48045 | — | |
hash9a09ad7b7e9ff7a465aa1150541e231189911afb | — | |
hash9ccd769624de98eeeb12714ff1707ec4f5bf196d | — | |
hash9dbfc23ebf36b3c0b56d2f93116abb32656c42e4 | — | |
hashaea55e42c4436236278e5692d3dcbcbe5fe6ce0b | — | |
hashbd8fbb5e6842df8683163adbd6a36136164eac58 | — | |
hashd2a5c9cbb73849cc0667987c33a9bf3822718e1528faef005f1628de3348ffb0 | — |
Threat ID: 69fa157fcbff5d86100eace9
Added to database: 5/5/2026, 4:06:23 PM
Last enriched: 5/5/2026, 4:21:32 PM
Last updated: 5/6/2026, 3:54:35 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.