DAEMON Tools Official Installers Trojanized in Month-Long Supply Chain Attack

DAEMON Tools Installers Compromised in Ongoing Supply-Chain Attack

CRITICAL
May 5, 2026
5m read
Supply Chain AttackMalwareCyberattack

Related Entities

Organizations

Products & Tech

DAEMON ToolseScanNotepad++CPU-Z

Other

AVB Disc SoftQUIC RAT

Full Report

Executive Summary

Security researchers at Kaspersky have uncovered a sophisticated, ongoing supply chain attack targeting users of DAEMON Tools, a widely used utility for optical drive emulation. Since at least April 8, 2026, official installers downloaded from the vendor's website have been trojanized. The malicious installers, specifically versions 12.5.0.2421 to 12.5.0.2434, are signed with a valid digital signature from the developer, AVB Disc Soft, which has allowed the attack to persist for nearly a month without detection. The initial payload is an information gatherer, but a small subset of victims in Russia, Belarus, and Thailand have been targeted with a second-stage implant, a sophisticated backdoor named QUIC RAT. This incident underscores the growing threat of supply chain attacks, where legitimate software distribution channels are hijacked to deploy malware.

Threat Overview

The attack begins when a user downloads and installs a compromised version of DAEMON Tools from the official website. The core binaries of the software, such as DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe, have been tampered with.

  1. Initial Compromise: Upon installation, a malicious file is configured to launch at every system startup.
  2. C2 Communication: The malware sends a request to a command-and-control (C2) server hosted on a typosquatted domain. This domain was registered a week before the attack began, indicating premeditation.
  3. Information Gathering: The first-stage payload is an information collector that gathers system details, including MAC address, hostname, running processes, installed software, and language settings. This data is sent to the C2 server.
  4. Targeted Second Stage: Based on the collected information, the attackers selectively deploy a more advanced backdoor to a small number of high-value targets. This indicates a targeted approach rather than a broad, indiscriminate campaign.
  5. Advanced Implant: The second-stage implant, QUIC RAT, is a sophisticated backdoor capable of downloading additional payloads, executing shell commands, and running shellcode in memory. It has been observed being injected into legitimate system processes like notepad.exe to evade detection.

Technical Analysis

The use of a valid digital signature is a key element of this attack, as it allows the malicious files to bypass security checks and builds trust with the user and operating system.

  • Affected Versions: DAEMON Tools Lite versions 12.5.0.2421 to 12.5.0.2434.
  • Compromised Binaries: DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe.
  • Persistence: The malware achieves persistence by creating a startup entry, ensuring it runs every time the system boots.
  • Second-Stage RAT: QUIC RAT supports multiple communication protocols and demonstrates advanced capabilities for stealth and control. Its deployment on only a dozen machines belonging to specific industries (retail, scientific, government, manufacturing) confirms the targeted nature of the final attack phase.
  • Attribution: While not definitively attributed, Kaspersky researchers noted the presence of Chinese-language artifacts in the malware implants.

MITRE ATT&CK Mapping

Impact Assessment

The impact of this supply chain attack varies based on whether the victim was selected for the second-stage payload.

  • For General Users: The initial infection results in information gathering, which can be used for reconnaissance for future attacks or sold to other threat actors.
  • For Targeted Victims: The deployment of QUIC RAT leads to a full system compromise. Attackers gain remote control, enabling them to steal sensitive data, deploy further malware (like ransomware), and move laterally within the victim's network. The targeting of retail, scientific, government, and manufacturing organizations suggests an espionage or high-value data theft motive.

IOCs — Directly from Articles

No specific Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were provided in the source articles.

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns to identify potential DAEMON Tools compromises:

Type
File Name
Value
DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe
Description
Monitor for versions of these files with a creation/modification date between April 8, 2026 and May 5, 2026. Check digital signatures.
Type
Process Name
Value
notepad.exe
Description
Monitor for notepad.exe processes making unexpected outbound network connections, which could indicate QUIC RAT injection.
Type
URL Pattern
Value
*daemon-tools.cc*
Description
The legitimate domain is daemon-tools.cc. Monitor for connections to typosquatted variations.
Type
Log Source
Value
DNS Logs, Proxy Logs
Description
Hunt for requests to newly registered domains or domains that mimic legitimate software sites.

Detection & Response

  1. Asset Inventory: Identify all systems with DAEMON Tools installed. Check the version numbers; if they fall within the range of 12.5.0.2421 to 12.5.0.2434, consider them compromised.
  2. Network Traffic Analysis: Per D3FEND's Network Traffic Analysis technique, monitor outbound traffic from machines running DAEMON Tools for connections to suspicious or unknown domains. Baseline normal traffic and alert on deviations.
  3. Endpoint Analysis: On potentially affected machines, investigate startup items for suspicious entries. Examine running processes for signs of injection (e.g., notepad.exe with active network sockets).
  4. Incident Response: If a compromise is confirmed, isolate the affected machine from the network, preserve it for forensic analysis, and re-image it. Revoke any credentials that may have been stored on or used from the machine.

Mitigation

  1. Software Vetting and Control: Implement strict controls on software installation. Use application whitelisting to prevent unauthorized or untrusted software from being installed. Reference D3FEND's Executable Allowlisting.
  2. Supply Chain Security: For software vendors, securing the build and distribution pipeline is critical. This includes code signing integrity checks, access controls on build servers, and regular security audits.
  3. Egress Filtering: Implement outbound traffic filtering to block connections to known malicious or uncategorized domains, which can prevent malware from communicating with its C2 server. This aligns with D3FEND's Outbound Traffic Filtering technique.
  4. Digital Signature Verification: While the signature was valid in this case, organizations should still have processes to verify software integrity. In the future, revocation lists (CRLs) may be updated to invalidate the compromised certificate.

Timeline of Events

1
April 1, 2026
Approximate date the typosquatted C2 domain was registered.
2
April 8, 2026
The supply chain attack begins, with trojanized DAEMON Tools installers being distributed.
3
May 5, 2026
Kaspersky publishes its findings on the ongoing supply chain attack.
4
May 5, 2026
This article was published

MITRE ATT&CK Mitigations

While bypassed in this attack, rigorous verification of digital signatures, including checking against revocation lists, remains a key defense. Developers must protect signing keys.

Use application control solutions to restrict software execution to only explicitly authorized applications, preventing trojanized installers from running.

Block outbound connections to known malicious or uncategorized domains to prevent C2 communication.

Keep antivirus and antimalware solutions updated to detect known malicious payloads and behaviors.

D3FEND Defensive Countermeasures

To detect the DAEMON Tools compromise, security teams should focus on network behavior. Since the malware communicates with a C2 server, network traffic analysis is critical. Implement monitoring on DNS and web proxy logs for connections to newly registered domains or domains with names that are typosquatted versions of legitimate software vendors. For the second-stage QUIC RAT, which may be injected into notepad.exe, establish a baseline of normal network activity for common system processes. Any outbound connection from notepad.exe should be treated as highly suspicious and trigger an immediate alert. Using NetFlow or deep packet inspection can help identify the anomalous communication patterns associated with the backdoor's activity, even if the traffic is encrypted.

This attack involved tampering with legitimate service executables like DiscSoftBusServiceLite.exe. Service Binary Verification can be used to detect such modifications. Implement a file integrity monitoring (FIM) solution on endpoints and servers. The FIM tool should be configured to calculate and store baseline hashes of critical system files and installed application binaries, including those for DAEMON Tools. The system should then periodically re-calculate the hashes and compare them against the baseline. Any mismatch for DTHelper.exe, DiscSoftBusServiceLite.exe, or DTShellHlp.exe would indicate tampering and should generate a high-priority security alert, allowing for investigation before further compromise occurs.

Timeline of Events

1
April 1, 2026

Approximate date the typosquatted C2 domain was registered.

2
April 8, 2026

The supply chain attack begins, with trojanized DAEMON Tools installers being distributed.

3
May 5, 2026

Kaspersky publishes its findings on the ongoing supply chain attack.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

DAEMON ToolsSupply Chain AttackQUIC RATKasperskyDigital SignatureTrojan

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.