Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack

Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack

The widely utilized Daemon Tools application, known for its disk image mounting capabilities, has fallen victim to a significant supply-chain attack that lasted for an entire month, according to researchers. Kaspersky, the cybersecurity firm investigating the incident, revealed that the attack commenced on April 8 and remained active at the time of their report. Malicious updates were delivered through the developer’s own servers, affecting installers signed with the official digital certificate and downloaded directly from the website. This compromise allowed the malware to execute Daemon Tools executables upon system boot. While Kaspersky did not specify, the technical details suggest that the affected versions are limited to those running on Windows, particularly versions 12.5.0.2421 through 12.5.0.2434. The malware embedded in the compromised versions is designed to gather sensitive information, including MAC addresses, hostnames, DNS domain names, running processes, installed software, and system locales. This data is then transmitted to an attacker-controlled server. The attack has reportedly impacted thousands of systems across over 100 countries, and among the infected machines, approximately 12 belong to sectors such as retail, science, government, and manufacturing, indicating a targeted approach. This incident adds to a troubling trend of supply-chain attacks, following previous breaches like the poisoning of the CCleaner utility in 2017, the SolarWinds software compromise in 2020, and the recent 3CX VoIP client breach in 2023. Such attacks are particularly challenging to defend against, as users unknowingly install malware through seemingly legitimate updates from official channels. The detection of this attack took weeks, similar to the timeline observed with the 3CX incident. Kaspersky's researchers emphasized the sophistication of the DAEMON Tools compromise, noting the challenges in uncovering the attack and the importance for organizations to scrutinize any machines running DAEMON Tools for unusual cybersecurity activities post-April 8.

Sources : Ars Technica

Published On : May 05, 2026, 19:50

AI
Nvidia's Bold Investments: Over $40 Billion Committed to AI Growth in 2026

Nvidia is rapidly solidifying its status as a major player in the AI landscape, having invested over $40 billion in vari...

CNBC | May 09, 2026, 12:15
Nvidia's Bold Investments: Over $40 Billion Committed to AI Growth in 2026
Startups
Fintech Startup Parker Faces Collapse Amid Bankruptcy Filing

Parker, a promising fintech startup known for providing corporate credit cards and banking solutions tailored for e-comm...

TechCrunch | May 09, 2026, 21:10
Fintech Startup Parker Faces Collapse Amid Bankruptcy Filing
AI
Anthropic Addresses Claude's Controversial Behavior: Internet Influence Revealed

In a recent revelation, Anthropic has shed light on the peculiar behavior exhibited by its AI model, Claude, during an e...

Business Insider | May 09, 2026, 11:55
Anthropic Addresses Claude's Controversial Behavior: Internet Influence Revealed
AI
AI Revolution Sparks Job Uncertainty in India's BFSI Sector

The rapid integration of artificial intelligence (AI) is causing significant stress among employees in India's Banking, ...

Business Today | May 09, 2026, 12:25
AI Revolution Sparks Job Uncertainty in India's BFSI Sector
Startups
San Francisco Real Estate Market Soars Beyond Expectations

The San Francisco housing market, long known for its steep prices, is now shattering previous records, indicating a dram...

TechCrunch | May 08, 2026, 22:45
San Francisco Real Estate Market Soars Beyond Expectations
View All News