Security researchers have uncovered a sophisticated, ongoing supply chain attack targeting users of DAEMON Tools, a popular disk emulation software. Since at least April 8, 2026, threat actors have compromised the official distribution channel, embedding malware into legitimate software installers downloaded from the DAEMON Tools website. The attack, attributed to a Chinese-speaking threat actor, uses a multi-stage approach. An initial backdoor infects a wide range of users, gathering system information. The attackers then selectively deploy a more advanced backdoor and a sophisticated implant known as QUIC RAT to a small number of high-value targets, including government, scientific, and manufacturing organizations in Belarus, Russia, and Thailand. The use of valid digital signatures on the malicious components has allowed the attack to remain stealthy and bypass many security measures.
The attack originates from trojanized installers for DAEMON Tools for Windows, specifically versions 12.5.0.2421 to 12.5.0.2434. These installers were available for download directly from the official daemon-tools.cc website. The compromise was orchestrated by a currently unidentified but suspected Chinese-speaking threat group.
The infection chain is as follows:
DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe), which are signed with a valid digital certificate from the developer AVB Disc Soft, execute at system startup. These files contain a backdoor.env-check.daemontools[.]cc) to receive further instructions.envchk.exe. This tool profiles the infected system, collecting hostname, MAC address, running processes, and installed software, and sends the data back to the C2.cdg.exe and cdg.tmp).The threat actor demonstrated a high level of sophistication by compromising legitimate, signed binaries. This technique, known as T1553.002 - Code Signing, significantly increases the malware's ability to evade detection by security software that trusts signed code.
The QUIC RAT implant is particularly advanced. It employs multiple communication protocols, including QUIC, DNS, and HTTP/3, for C2 communication, making its traffic difficult to block or analyze. It also uses control flow flattening obfuscation and injects itself into legitimate processes like notepad.exe (T1055 - Process Injection) to hide its presence on the infected system.
The initial reconnaissance phase allowed the attackers to filter through thousands of infections across over 100 countries to identify and focus on a dozen specific targets of interest. This demonstrates a clear espionage motive rather than a financially motivated one.
T1195.002 - Compromise Software Supply Chain: Compromising legitimate software installers on the vendor's website.T1553.002 - Code Signing: Using valid digital certificates to sign malicious binaries.T1071.004 - Application Layer Protocol: DNS: Using DNS for C2 communications.T1573.002 - Encrypted Channel: Asymmetric Cryptography: QUIC RAT uses encrypted protocols for C2.T1055 - Process Injection: QUIC RAT injects into notepad.exe.T1059.003 - Command and Scripting Interpreter: Windows Command Shell: The initial backdoor receives shell commands from the C2.T1082 - System Information Discovery: The envchk.exe payload gathers extensive system information.The impact of this attack is twofold:
The compromise of a trusted software vendor like DAEMON Tools erodes user trust and highlights the systemic risk posed by supply chain attacks. Even security-conscious users who download software from official sources can become victims.
env-check.daemontools[.]ccDTHelper.exeDiscSoftBusServiceLite.exeDTShellHlp.exeenvchk.execdg.exeSecurity teams should hunt for signs of this activity within their networks.
DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe against known good versions. Check the digital signature details; while valid, the signing date or certificate hash may be anomalous.env-check.daemontools[.]cc or other domains using daemontools as a substring but not matching the official daemon-tools.cc.DTHelper.exe or DiscSoftBusServiceLite.exe. Look for notepad.exe exhibiting network activity, which could be a sign of QUIC RAT injection.12.5.0.2421 through 12.5.0.2434. These systems should be considered potentially compromised and prioritized for investigation.envchk.exe and cdg.exe.env-check.daemontools[.]cc at the firewall or web proxy. Implement policies to inspect and potentially block traffic using non-standard protocols like QUIC to untrusted destinations.Kaspersky confirms DAEMON Tools supply chain attack ran April 8-May 5, 2026. Clean version 12.6 released. New victims in Germany, France, Spain, with 10% corporate infections.
While the attacker abused code signing, organizations can still use it for defense. Implement strict policies that only allow execution of software signed by a pre-approved list of trusted vendors and internal certificates.
Mapped D3FEND Techniques:
Filter outbound network traffic to block connections to known malicious domains and untrusted destinations. Egress filtering can prevent the initial C2 callback.
Mapped D3FEND Techniques:
Use application allowlisting tools to prevent the execution of unauthorized binaries like 'envchk.exe' and 'cdg.exe' in common download or temp folders.
Mapped D3FEND Techniques:
Regularly audit and update all third-party software. In this case, remove the compromised versions and install a verified clean version from the vendor once available.
Mapped D3FEND Techniques:
Implementing executable allowlisting, or application control, would be a highly effective defense against this DAEMON Tools attack. Even though the initial compromised binaries were signed, the subsequent payloads (envchk.exe, cdg.exe) dropped by the C2 server are unlikely to be signed or on an organization's pre-approved list. A properly configured application control solution (like Windows Defender Application Control) set to an enforcement mode would prevent these secondary payloads from ever executing. This severs the attack chain after the initial C2 callback, preventing the reconnaissance and targeted backdoor deployment stages. Security teams should start by inventorying all legitimate software and creating a baseline policy, then deploy it in audit mode to identify potential conflicts before moving to full enforcement on workstations and servers.
Outbound traffic filtering is a critical countermeasure for disrupting the DAEMON Tools attack lifecycle. The initial backdoor must communicate with the C2 server env-check.daemontools[.]cc to receive commands and download the next stage. Organizations should configure perimeter firewalls and web proxies to block all outbound connections to this known malicious domain. More strategically, implement a default-deny policy for outbound traffic from servers and workstations, only allowing connections to required services and destinations on approved ports. Specifically for this threat, monitor and consider blocking or restricting outbound QUIC (UDP port 443) traffic from endpoints that have no legitimate business need for it, as this is the protocol used by the advanced QUIC RAT.
Behavioral-based process analysis via an EDR solution is key to detecting the later stages of this attack. Security teams should create detection rules to hunt for the specific TTPs used. A primary rule should be to alert on any network connections originating from notepad.exe, as this is the process the QUIC RAT injects into. This is highly anomalous behavior. Additionally, monitor for the legitimate DAEMON Tools processes (DTHelper.exe, DiscSoftBusServiceLite.exe) spawning unexpected child processes, particularly cmd.exe or powershell.exe, or writing new executables to disk. By baselining normal application behavior and alerting on deviations, EDR can detect the malicious actions even if the initial files are trusted or signed.
The typosquatted C2 domain 'env-check.daemontools[.]cc' was registered.
The supply chain attack began, with trojanized DAEMON Tools installers appearing on the official website.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.