Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Supply chain attack via DAEMON Tools | Kaspersky official blog

0
Medium
Vulnerability
Published: Tue May 05 2026 (05/05/2026, 12:09:52 UTC)
Source: Kaspersky Security Blog

Description

Kaspersky experts have identified a large-scale supply chain attack involving the DAEMON Tools software, where attackers injected malicious code into the official installers signed by the legitimate developer. The compromised versions, distributed since April 8, 2026, launch a persistent Trojan that communicates with a command-and-control server to download additional payloads, including an information gatherer, a minimalistic backdoor, and potentially a more advanced RAT called QUIC RAT. The attack has targeted thousands of users worldwide, primarily home users, with some infections in organizational environments, including government and scientific sectors. The malicious code affects specific DAEMON Tools executables in versions 12. 5. 0. 2421 to 12. 5. 0. 2434.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/05/2026, 12:23:47 UTC

Technical Analysis

A supply chain attack was discovered by Kaspersky involving DAEMON Tools software installers that were trojanized with malicious code signed by the legitimate developer's digital signature. The infected installers have been circulating since April 8, 2026, affecting versions 12.5.0.2421 to 12.5.0.2434. The malware installs a persistent Trojan that contacts a command-and-control server to receive commands and download additional payloads. Initial payloads collect system information such as MAC address, hostname, DNS domain, running processes, installed software, and language settings. Based on this data, a backdoor may be deployed capable of executing shell commands and loading further modules in memory. This backdoor can then deploy a more sophisticated RAT named QUIC RAT, which supports multiple communication protocols and can inject payloads into legitimate system processes. The attack has targeted thousands of users globally, with a minority of infections in organizational environments, including government and scientific institutions. The compromised files include DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe. The attack remains active as of the last report.

Potential Impact

The attack compromises the integrity of DAEMON Tools installers, leading to the installation of persistent malware that can gather sensitive system information and enable remote control via a backdoor and advanced RAT. This allows attackers to execute arbitrary commands, deploy additional malicious payloads, and potentially maintain long-term access to infected systems. The infection affects both home users and organizations, including government and scientific sectors, increasing the risk of espionage or data theft. The widespread geographic distribution includes Russia, Brazil, Turkey, Spain, Germany, France, Italy, China, Belarus, and Thailand. The attack undermines trust in the software supply chain and poses a significant risk to affected users.

Mitigation Recommendations

At the time of reporting, no official patch or remediation from the vendor is indicated. Users and organizations using DAEMON Tools should thoroughly check systems for unusual activity starting from April 8, 2026. Employing reliable security solutions is recommended, as Kaspersky's products have been effective in detecting and blocking the malware involved in this supply chain attack. Users should avoid installing or reinstalling affected versions (12.5.0.2421 to 12.5.0.2434) until the vendor provides an official fix or advisory. Monitoring for indicators of compromise as detailed in the Kaspersky report is advised. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/daemon-tools-supply-chain-attack/55691/","fetched":true,"fetchedAt":"2026-05-05T12:23:38.915Z","wordCount":924}

Threat ID: 69f9e14acbff5d8610f6972f

Added to database: 5/5/2026, 12:23:38 PM

Last enriched: 5/5/2026, 12:23:47 PM

Last updated: 5/5/2026, 12:24:04 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses