Security researchers at Kaspersky have uncovered a sophisticated, ongoing supply chain attack targeting users of DAEMON Tools, a widely used utility for optical drive emulation. Since at least April 8, 2026, official installers downloaded from the vendor's website have been trojanized. The malicious installers, specifically versions 12.5.0.2421 to 12.5.0.2434, are signed with a valid digital signature from the developer, AVB Disc Soft, which has allowed the attack to persist for nearly a month without detection. The initial payload is an information gatherer, but a small subset of victims in Russia, Belarus, and Thailand have been targeted with a second-stage implant, a sophisticated backdoor named QUIC RAT. This incident underscores the growing threat of supply chain attacks, where legitimate software distribution channels are hijacked to deploy malware.
The attack begins when a user downloads and installs a compromised version of DAEMON Tools from the official website. The core binaries of the software, such as DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe, have been tampered with.
notepad.exe to evade detection.The use of a valid digital signature is a key element of this attack, as it allows the malicious files to bypass security checks and builds trust with the user and operating system.
DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe.T1195.002 - Compromise Software Supply Chain: Compromise Software Developer/Supplier: The core of the attack involves compromising the developer's build or distribution process to trojanize legitimate software.T1588.002 - Resource Development: Tool: The attackers modified a legitimate tool (DAEMON Tools) to serve their malicious purpose.T1105 - Ingress Tool Transfer: The C2 server commands the initial implant to download and execute the second-stage payload (QUIC RAT).T1027 - Obfuscated Files or Information: The use of a valid digital signature and injection into notepad.exe are forms of defense evasion.T1059.003 - Command and Scripting Interpreter: Windows Command Shell: QUIC RAT is capable of executing shell commands.T1041 - Exfiltration Over C2 Channel: The initial implant exfiltrates collected system information to the C2 server.The impact of this supply chain attack varies based on whether the victim was selected for the second-stage payload.
No specific Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were provided in the source articles.
Security teams may want to hunt for the following patterns to identify potential DAEMON Tools compromises:
DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exenotepad.exenotepad.exe processes making unexpected outbound network connections, which could indicate QUIC RAT injection.*daemon-tools.cc*daemon-tools.cc. Monitor for connections to typosquatted variations.Network Traffic Analysis technique, monitor outbound traffic from machines running DAEMON Tools for connections to suspicious or unknown domains. Baseline normal traffic and alert on deviations.notepad.exe with active network sockets).Executable Allowlisting.Outbound Traffic Filtering technique.While bypassed in this attack, rigorous verification of digital signatures, including checking against revocation lists, remains a key defense. Developers must protect signing keys.
Use application control solutions to restrict software execution to only explicitly authorized applications, preventing trojanized installers from running.
Block outbound connections to known malicious or uncategorized domains to prevent C2 communication.
Keep antivirus and antimalware solutions updated to detect known malicious payloads and behaviors.
To detect the DAEMON Tools compromise, security teams should focus on network behavior. Since the malware communicates with a C2 server, network traffic analysis is critical. Implement monitoring on DNS and web proxy logs for connections to newly registered domains or domains with names that are typosquatted versions of legitimate software vendors. For the second-stage QUIC RAT, which may be injected into notepad.exe, establish a baseline of normal network activity for common system processes. Any outbound connection from notepad.exe should be treated as highly suspicious and trigger an immediate alert. Using NetFlow or deep packet inspection can help identify the anomalous communication patterns associated with the backdoor's activity, even if the traffic is encrypted.
This attack involved tampering with legitimate service executables like DiscSoftBusServiceLite.exe. Service Binary Verification can be used to detect such modifications. Implement a file integrity monitoring (FIM) solution on endpoints and servers. The FIM tool should be configured to calculate and store baseline hashes of critical system files and installed application binaries, including those for DAEMON Tools. The system should then periodically re-calculate the hashes and compare them against the baseline. Any mismatch for DTHelper.exe, DiscSoftBusServiceLite.exe, or DTShellHlp.exe would indicate tampering and should generate a high-priority security alert, allowing for investigation before further compromise occurs.
Approximate date the typosquatted C2 domain was registered.
The supply chain attack begins, with trojanized DAEMON Tools installers being distributed.
Kaspersky publishes its findings on the ongoing supply chain attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.