Xtcworld

6 Key Insights Into the Daemon Tools Supply-Chain Attack

A monthlong supply-chain attack backdoored Daemon Tools via signed updates from official servers, affecting Windows versions 12.5.0.2421-2434, stealing system data, and targeting select high-value organizations.

Xtcworld · 2026-05-08 19:36:17 · Technology

In a disturbing development for the security community, researchers at Kaspersky uncovered a monthlong supply-chain attack targeting users of Daemon Tools—a popular disk-mounting utility. The attackers managed to compromise the developer's update servers, pushing out malicious installers signed with official digital certificates. This article breaks down the critical details every user and organization should know about the attack, its timeline, impact, and how to stay protected.

1. A Silent Compromise: How Daemon Tools Got Backdoored

The attack leveraged the trust users place in legitimate software updates. Beginning around April 8, the official Daemon Tools website served infected installer files that carried the developer's own digital signature. This means even users who downloaded the software directly from the source were at risk. The malicious payload executed at boot time, embedding itself deep into the system. Because the files appeared authentic and came from the official domain, traditional defenses—such as checking digital signatures or trusting known publishers—failed to flag the threat. This method is particularly dangerous because it exploits the supply chain rather than individual user errors, making detection extremely difficult.

6 Key Insights Into the Daemon Tools Supply-Chain Attack
Source: feeds.arstechnica.com

2. The Timeline of a Stealthy Attack

According to Kaspersky's report, the active compromise spans from April 8 and was still ongoing as of the report's publication. This prolonged period allowed the attackers to distribute malware to a wide user base while remaining under the radar. The malicious updates were pushed out over several weeks, suggesting a well-coordinated operation. The attackers likely aimed to maximize the number of infections before discovery. Notably, the attack is limited to Windows systems, as the malicious code specifically targets Windows executables. Users of other platforms, such as macOS or Linux, were not affected by this particular campaign.

3. Which Versions Are Affected and How to Identify Them

If you use Daemon Tools, you need to check your version immediately. The compromised builds are versions 12.5.0.2421 through 12.5.0.2434. These installers, when run, infect the Daemon Tools executables. Kaspersky did not explicitly state whether uninstalling the application removes the malware, but given that the malicious code runs at boot, a simple uninstall may not be sufficient. Users are advised to scan their systems with updated security software and consider restoring from a known clean backup. Additionally, organizations should review any systems that may have installed these versions during the affected period.

4. Inside the Malware: Data Theft and Second-Stage Payloads

The initial payload is a data collector. It gathers a detailed fingerprint of each infected machine, including MAC addresses, hostnames, DNS domain names, running processes, installed software, and system locales. This information is exfiltrated to an attacker-controlled server, allowing the criminals to map out the target environment. In a smaller subset of infections—only about 12 machines—a second-stage follow-on payload was delivered. This indicates a targeted approach within the broader campaign. The victims that received the second payload belonged to specific sectors, suggesting the attackers were looking for high-value targets for further exploitation.

6 Key Insights Into the Daemon Tools Supply-Chain Attack
Source: feeds.arstechnica.com

5. Who Was in the Crosshairs? Targeted Sectors and Countries

While thousands of machines across more than 100 countries were infected, the attackers showed selective interest. Only approximately 12 machines—belonging to organizations in the retail, scientific, government, and manufacturing sectors—received the second-stage payload. This pattern strongly suggests a supply-chain attack aiming to infiltrate specific high-value networks. The broad initial infection may have been a way to cast a wide net, while the second payload was reserved for targets that met certain criteria, such as belonging to sensitive industries or having access to valuable data. Users in these sectors should be particularly vigilant.

6. Why Supply-Chain Attacks Are So Hard to Detect

This attack exemplifies the difficulty in defending against supply-chain compromises. The malicious files were signed by the developer's legitimate digital certificate, leading antivirus engines and Windows Defender to trust them. Because the attackers controlled the update server, they had full control over what users downloaded—turning a trusted source into a vector for malware. Traditional security measures like verifying publisher identity or checking file hashes would be ineffective if the attacker has legitimate credentials. This underscores the need for behavioral detection, network monitoring, and a zero-trust approach to even trusted software updates. Organizations should also implement application whitelisting and restrict administrative privileges to reduce the blast radius.

The Daemon Tools supply-chain attack is a stark reminder that no software is safe from compromise. Users should immediately check their Daemon Tools version, run comprehensive antivirus scans, and monitor for any suspicious network activity. For organizations, reinforcing supply chain security and adopting advanced threat detection tools is critical. Vigilance and proactive defense are the best weapons against these invisible threats.

Recommended