Www.casino88DocsTechnology
Related
NVIDIA and Google Cloud Unveil Next-Gen AI Infrastructure for Agentic and Physical AIStop Overlooking Experience: A Step-by-Step Guide to Hiring Older Workers for a Competitive EdgeSwift 6.3 Launches with Groundbreaking C Interoperability and Official Android SDKStep-by-Step: Deploying DuckLake 1.0 for Efficient Data Lake ManagementGitHub Overhauls Status Page with New Degraded Performance Tier and Per-Service Uptime MetricsRust 1.95.0 Rolls Out with Compile-Time Configuration Macro and Enhanced Pattern MatchingKubernetes v1.36 'Haru' Delivers 70 Enhancements Across Stable, Beta, and AlphaBlackBerry's QNX Division Powers Safety in 275 Million Cars, Drives Half of Revenue – Yet Most People Have No Idea

Daemon Tools Hit by Month-Long Supply Chain Attack: Researchers Warn of Signed Malware

Last updated: 2026-05-08 18:30:32 · Technology

Breaking: Daemon Tools Installers Compromised

Security firm Kaspersky has revealed that the popular disk mounting app Daemon Tools was backdoored in a supply-chain attack that ran for over a month. The attack, which began on April 8, pushed malicious updates through the developer's own servers, signed with official digital certificates.

Daemon Tools Hit by Month-Long Supply Chain Attack: Researchers Warn of Signed Malware
Source: feeds.arstechnica.com

"This is a sophisticated attack that exploited trust in software updates," said a Kaspersky researcher. "Users who downloaded installers from the official Daemon Tools website during this period may have been infected."

Scope and Impact

Affected versions include 12.5.0.2421 through 12.5.0.2434 for Windows. The initial payload collects MAC addresses, hostnames, DNS domains, running processes, installed software, and system locales. This data is sent to an attacker-controlled server.

Kaspersky detected infections on thousands of machines across more than 100 countries. However, only about 12 machines—belonging to retail, scientific, government, and manufacturing organizations—received a follow-on payload, indicating targeted espionage.

Daemon Tools Hit by Month-Long Supply Chain Attack: Researchers Warn of Signed Malware
Source: feeds.arstechnica.com

Background

Daemon Tools is a widely used utility for mounting virtual disk images. Supply-chain attacks like this are particularly dangerous because the malware is signed with legitimate certificates, making it harder to detect. The attack remained active as of the time of Kaspersky's report, though the company did not specify when it ended.

What This Means

Users of Daemon Tools for Windows should immediately check their version number and update to the latest patched version. The incident underscores the growing threat of supply-chain compromises targeting widely used software. Organizations should monitor for unusual network traffic from Daemon Tools processes.

Kaspersky advises that infected machines may exhibit signs of data exfiltration. The company recommends full system scans and review of running processes for suspicious activity.