Chinese-Speaking Hackers Compromise DAEMON Tools in Large-Scale Supply Chain Attack

DAEMON Tools Installers Trojanized in Sophisticated Supply Chain Attack

HIGH
May 6, 2026
May 9, 2026
5m read
Supply Chain AttackThreat ActorMalware

Related Entities(initial)

Threat Actors

Chinese-speaking threat actor

Organizations

Products & Tech

Other

AVB Disc SoftQUIC RAT

Full Report(when first published)

Executive Summary

Security researchers have uncovered a sophisticated, ongoing supply chain attack targeting users of DAEMON Tools, a popular disk emulation software. Since at least April 8, 2026, threat actors have compromised the official distribution channel, embedding malware into legitimate software installers downloaded from the DAEMON Tools website. The attack, attributed to a Chinese-speaking threat actor, uses a multi-stage approach. An initial backdoor infects a wide range of users, gathering system information. The attackers then selectively deploy a more advanced backdoor and a sophisticated implant known as QUIC RAT to a small number of high-value targets, including government, scientific, and manufacturing organizations in Belarus, Russia, and Thailand. The use of valid digital signatures on the malicious components has allowed the attack to remain stealthy and bypass many security measures.


Threat Overview

The attack originates from trojanized installers for DAEMON Tools for Windows, specifically versions 12.5.0.2421 to 12.5.0.2434. These installers were available for download directly from the official daemon-tools.cc website. The compromise was orchestrated by a currently unidentified but suspected Chinese-speaking threat group.

The infection chain is as follows:

  1. Initial Compromise: A user downloads and installs a trojanized version of DAEMON Tools.
  2. Backdoor Activation: Compromised binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe), which are signed with a valid digital certificate from the developer AVB Disc Soft, execute at system startup. These files contain a backdoor.
  3. C2 Communication: The backdoor contacts a typosquatted command-and-control (C2) domain (env-check.daemontools[.]cc) to receive further instructions.
  4. Stage 1 Payload (Reconnaissance): The C2 server instructs the backdoor to download and execute an information-stealing tool, envchk.exe. This tool profiles the infected system, collecting hostname, MAC address, running processes, and installed software, and sends the data back to the C2.
  5. Stage 2 Payload (Targeted Backdoor): Based on the reconnaissance data, the attackers select high-value targets. These targets receive a second, more minimalistic backdoor (cdg.exe and cdg.tmp).
  6. Stage 3 Payload (Advanced RAT): In at least one highly targeted case, the attackers used the second backdoor to deploy QUIC RAT, an advanced remote access trojan, against an educational institution in Russia.

Technical Analysis

The threat actor demonstrated a high level of sophistication by compromising legitimate, signed binaries. This technique, known as T1553.002 - Code Signing, significantly increases the malware's ability to evade detection by security software that trusts signed code.

The QUIC RAT implant is particularly advanced. It employs multiple communication protocols, including QUIC, DNS, and HTTP/3, for C2 communication, making its traffic difficult to block or analyze. It also uses control flow flattening obfuscation and injects itself into legitimate processes like notepad.exe (T1055 - Process Injection) to hide its presence on the infected system.

The initial reconnaissance phase allowed the attackers to filter through thousands of infections across over 100 countries to identify and focus on a dozen specific targets of interest. This demonstrates a clear espionage motive rather than a financially motivated one.

MITRE ATT&CK Techniques Observed:

Impact Assessment

The impact of this attack is twofold:

  1. Widespread Initial Infection: Thousands of users across more than 100 countries were infected with the initial information-gathering malware. While not the primary goal, this data could be used for other malicious purposes or sold.
  2. Targeted Espionage: The primary impact is on the dozen highly targeted organizations in the government, scientific, manufacturing, and retail sectors. For these victims, the deployment of QUIC RAT represents a severe breach, enabling long-term persistence, data exfiltration, and complete remote control of their systems.

The compromise of a trusted software vendor like DAEMON Tools erodes user trust and highlights the systemic risk posed by supply chain attacks. Even security-conscious users who download software from official sources can become victims.

IOCs — Directly from Articles

Type
domain
Value
env-check.daemontools[.]cc
Description
Typosquatted Command-and-Control domain.
Type
file_name
Value
DTHelper.exe
Description
Compromised legitimate binary.
Type
file_name
Value
DiscSoftBusServiceLite.exe
Description
Compromised legitimate binary.
Type
file_name
Value
DTShellHlp.exe
Description
Compromised legitimate binary.
Type
file_name
Value
envchk.exe
Description
Stage 1 information-gathering tool.
Type
file_name
Value
cdg.exe
Description
Stage 2 backdoor loader.

Detection & Response

Security teams should hunt for signs of this activity within their networks.

  • File Analysis (D3-FA): Scan systems for the presence of the IOC file names listed above. Use file hashing to compare DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe against known good versions. Check the digital signature details; while valid, the signing date or certificate hash may be anomalous.
  • DNS Analysis: Monitor DNS logs for any requests to the malicious domain env-check.daemontools[.]cc or other domains using daemontools as a substring but not matching the official daemon-tools.cc.
  • Process Analysis (D3-PA): On systems with DAEMON Tools installed, monitor for suspicious child processes spawned by DTHelper.exe or DiscSoftBusServiceLite.exe. Look for notepad.exe exhibiting network activity, which could be a sign of QUIC RAT injection.
  • Software Inventory: Identify all systems with DAEMON Tools installed, particularly versions 12.5.0.2421 through 12.5.0.2434. These systems should be considered potentially compromised and prioritized for investigation.

Mitigation

  • Software Removal: If DAEMON Tools is not a business-critical application, the safest course of action is to uninstall it from all corporate systems.
  • Update Software: If the software is required, ensure it is updated to a version released after the incident, once the vendor has confirmed it is clean. Monitor communications from AVB Disc Soft for official guidance.
  • Executable Allowlisting (D3-EAL): Implement application control policies to prevent the execution of unauthorized executables like envchk.exe and cdg.exe.
  • Outbound Traffic Filtering (D3-OTF): Block outbound connections to the known C2 domain env-check.daemontools[.]cc at the firewall or web proxy. Implement policies to inspect and potentially block traffic using non-standard protocols like QUIC to untrusted destinations.

Timeline of Events

1
March 27, 2026
The typosquatted C2 domain 'env-check.daemontools[.]cc' was registered.
2
April 8, 2026
The supply chain attack began, with trojanized DAEMON Tools installers appearing on the official website.
3
May 6, 2026
This article was published

Article Updates

May 9, 2026

Kaspersky confirms DAEMON Tools supply chain attack ran April 8-May 5, 2026. Clean version 12.6 released. New victims in Germany, France, Spain, with 10% corporate infections.

MITRE ATT&CK Mitigations

While the attacker abused code signing, organizations can still use it for defense. Implement strict policies that only allow execution of software signed by a pre-approved list of trusted vendors and internal certificates.

Mapped D3FEND Techniques:

Filter outbound network traffic to block connections to known malicious domains and untrusted destinations. Egress filtering can prevent the initial C2 callback.

Mapped D3FEND Techniques:

Use application allowlisting tools to prevent the execution of unauthorized binaries like 'envchk.exe' and 'cdg.exe' in common download or temp folders.

Mapped D3FEND Techniques:

Regularly audit and update all third-party software. In this case, remove the compromised versions and install a verified clean version from the vendor once available.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Implementing executable allowlisting, or application control, would be a highly effective defense against this DAEMON Tools attack. Even though the initial compromised binaries were signed, the subsequent payloads (envchk.exe, cdg.exe) dropped by the C2 server are unlikely to be signed or on an organization's pre-approved list. A properly configured application control solution (like Windows Defender Application Control) set to an enforcement mode would prevent these secondary payloads from ever executing. This severs the attack chain after the initial C2 callback, preventing the reconnaissance and targeted backdoor deployment stages. Security teams should start by inventorying all legitimate software and creating a baseline policy, then deploy it in audit mode to identify potential conflicts before moving to full enforcement on workstations and servers.

Outbound traffic filtering is a critical countermeasure for disrupting the DAEMON Tools attack lifecycle. The initial backdoor must communicate with the C2 server env-check.daemontools[.]cc to receive commands and download the next stage. Organizations should configure perimeter firewalls and web proxies to block all outbound connections to this known malicious domain. More strategically, implement a default-deny policy for outbound traffic from servers and workstations, only allowing connections to required services and destinations on approved ports. Specifically for this threat, monitor and consider blocking or restricting outbound QUIC (UDP port 443) traffic from endpoints that have no legitimate business need for it, as this is the protocol used by the advanced QUIC RAT.

Behavioral-based process analysis via an EDR solution is key to detecting the later stages of this attack. Security teams should create detection rules to hunt for the specific TTPs used. A primary rule should be to alert on any network connections originating from notepad.exe, as this is the process the QUIC RAT injects into. This is highly anomalous behavior. Additionally, monitor for the legitimate DAEMON Tools processes (DTHelper.exe, DiscSoftBusServiceLite.exe) spawning unexpected child processes, particularly cmd.exe or powershell.exe, or writing new executables to disk. By baselining normal application behavior and alerting on deviations, EDR can detect the malicious actions even if the initial files are trusted or signed.

Timeline of Events

1
March 27, 2026

The typosquatted C2 domain 'env-check.daemontools[.]cc' was registered.

2
April 8, 2026

The supply chain attack began, with trojanized DAEMON Tools installers appearing on the official website.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Supply Chain AttackDAEMON ToolsQUIC RATChinese-speaking threat actorKasperskyMalwareEspionage

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.