Vendor Says Daemon Tools Supply Chain Attack Contained
Daemon Tools developer Disc Soft experienced a supply chain attack affecting the free Daemon Tools Lite version 12. 5. 1. Chinese-speaking threat actors injected malware into installation packages released between April 8 and May 5, 2026, which led to information collection and selective backdoor deployments on targeted systems in Belarus, Russia, and Thailand. The company identified impacted systems, removed compromised files, rebuilt and validated clean installation packages, and released a clean version 12. 6. 0. 2445 on May 5. The attack was contained, with no impact on other Daemon Tools products. Users who downloaded the compromised version are advised to uninstall it and scan their systems for malware.
AI Analysis
Technical Summary
Disc Soft confirmed a targeted supply chain attack on Daemon Tools Lite version 12.5.1, where Chinese-speaking threat actors trojanized installation packages released between April 8 and May 5, 2026. The injected code downloaded an information collector and selectively deployed backdoors on systems in government, scientific, manufacturing, and retail sectors in Belarus, Russia, and Thailand. The company isolated affected systems, removed compromised files, and rebuilt installation packages, releasing a clean version 12.6.0.2445. The incident was contained with no impact on other Daemon Tools products. Users who installed the compromised version should uninstall and scan their systems. Disc Soft is reviewing infrastructure and enhancing verification to reduce future risks.
Potential Impact
The supply chain attack resulted in the distribution of trojanized Daemon Tools Lite installers that infected thousands of machines, with selective backdoor deployment on a limited number of targeted systems in Belarus, Russia, and Thailand. The compromised version was limited to Daemon Tools Lite 12.5.1. Other Daemon Tools products were unaffected. The attack enabled information collection and potential unauthorized access on targeted systems. The vendor has contained the incident and removed compromised files from distribution.
Mitigation Recommendations
Disc Soft has contained the incident by isolating affected systems, removing compromised files, and releasing a clean Daemon Tools Lite version 12.6.0.2445. Users who downloaded the compromised version 12.5.1 should uninstall it and perform malware scans on their systems. The vendor is enhancing verification procedures to prevent recurrence. No further action is required for users of other Daemon Tools products. Patch status is confirmed as fixed with the release of the clean version.
Affected Countries
Belarus, Russia, Thailand
Vendor Says Daemon Tools Supply Chain Attack Contained
Description
Daemon Tools developer Disc Soft experienced a supply chain attack affecting the free Daemon Tools Lite version 12. 5. 1. Chinese-speaking threat actors injected malware into installation packages released between April 8 and May 5, 2026, which led to information collection and selective backdoor deployments on targeted systems in Belarus, Russia, and Thailand. The company identified impacted systems, removed compromised files, rebuilt and validated clean installation packages, and released a clean version 12. 6. 0. 2445 on May 5. The attack was contained, with no impact on other Daemon Tools products. Users who downloaded the compromised version are advised to uninstall it and scan their systems for malware.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Disc Soft confirmed a targeted supply chain attack on Daemon Tools Lite version 12.5.1, where Chinese-speaking threat actors trojanized installation packages released between April 8 and May 5, 2026. The injected code downloaded an information collector and selectively deployed backdoors on systems in government, scientific, manufacturing, and retail sectors in Belarus, Russia, and Thailand. The company isolated affected systems, removed compromised files, and rebuilt installation packages, releasing a clean version 12.6.0.2445. The incident was contained with no impact on other Daemon Tools products. Users who installed the compromised version should uninstall and scan their systems. Disc Soft is reviewing infrastructure and enhancing verification to reduce future risks.
Potential Impact
The supply chain attack resulted in the distribution of trojanized Daemon Tools Lite installers that infected thousands of machines, with selective backdoor deployment on a limited number of targeted systems in Belarus, Russia, and Thailand. The compromised version was limited to Daemon Tools Lite 12.5.1. Other Daemon Tools products were unaffected. The attack enabled information collection and potential unauthorized access on targeted systems. The vendor has contained the incident and removed compromised files from distribution.
Mitigation Recommendations
Disc Soft has contained the incident by isolating affected systems, removing compromised files, and releasing a clean Daemon Tools Lite version 12.6.0.2445. Users who downloaded the compromised version 12.5.1 should uninstall it and perform malware scans on their systems. The vendor is enhancing verification procedures to prevent recurrence. No further action is required for users of other Daemon Tools products. Patch status is confirmed as fixed with the release of the clean version.
Technical Details
- Article Source
- {"url":"https://www.securityweek.com/vendor-says-daemon-tools-supply-chain-attack-contained/","fetched":true,"fetchedAt":"2026-05-07T13:22:46.944Z","wordCount":993}
Threat ID: 69fc9226cbff5d8610f1ef7e
Added to database: 5/7/2026, 1:22:46 PM
Last enriched: 5/7/2026, 1:22:54 PM
Last updated: 5/7/2026, 4:21:58 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.