Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Supply Chain Attack Targets DAEMON Tools Software

Supply Chain Attack Targets DAEMON Tools Software

Posted on May 5, 2026 By CWS

In a major cybersecurity incident identified in early May 2026, DAEMON Tools, a widely-used disk image mounting software, was compromised to disseminate malware globally. This sophisticated supply chain attack was detected by Kaspersky researchers when installers on the official DAEMON Tools site were found to be altered with malicious code beginning April 8, 2026.

Compromised Installers and Digital Certificates

The attack affected DAEMON Tools versions 12.5.0.2421 to 12.5.0.2434, with installers signed using legitimate digital certificates from the software’s developer, AVB Disc Soft. Despite thousands of attempts to infect systems in over 100 countries, attackers employed targeted methods post-compromise. Artifacts suggest a Chinese-speaking group may be involved, though this has not been definitively confirmed.

Upon discovery, AVB Disc Soft was promptly informed, enabling immediate efforts to mitigate the attack’s impact. The compromised executables, such as DTHelper.exe and DTShellHlp.exe, facilitated a backdoor activation when executed, leading to unauthorized communications with a malicious server.

Backdoor Mechanism and Payload Deployment

The malicious backdoor, embedded within the installation files, initiates communication with a server imitating the legitimate domain. This server, registered shortly before the attack commenced, executes shell commands using PowerShell to download an initial payload. This payload collects extensive system data, including MAC addresses, hostnames, and installed software details.

Notably, the payload’s .NET executable contains Chinese script, hinting at the origins of the perpetrators. The attackers selectively targeted valuable systems for further exploitation, with the second-stage payload impacting a limited number of machines in government and commercial sectors.

Advanced Threats and Recommendations

The second-stage payload involved a minimalist backdoor that uses RC4 encryption for payload execution, demonstrating manual intervention by attackers. For high-value targets, a sophisticated implant known as QUIC RAT was deployed, capable of evading detection through complex obfuscation and using advanced communication protocols.

This incident underlines the growing threat of software supply chain attacks in 2026. Similar breaches have occurred earlier this year, highlighting the need for robust security measures. Organizations are advised to monitor DAEMON Tools installations for unusual activities and enforce Zero Trust security models to safeguard against such threats.

Security teams should actively search for the information collector payload using the SHA1 hash 2d4eb55b01f59c62c6de9aacba9b47267d398fe4, and block all outgoing connections to the malicious domain and IP address specified in the attack indicators. Proactive threat hunting and incident response are crucial to mitigate the effects of these sophisticated cyber threats.

Cyber Security News Tags:Backdoor, Cybersecurity, DAEMON Tools, digital certificates, endpoint monitoring, incident response, information collector, Kaspersky, Malware, QUIC RAT, Software Security, supply chain attack, Threat Actors, Zero Trust

Post navigation

Previous Post: Microsoft Alerts US Firms to Advanced Phishing Scheme
Next Post: China-Linked UAT-8302 Targets Global Governments with APT Malware

Related Posts

CISA Warns Of Windows Improper Access Control Vulnerability Exploited In Attacks CISA Warns Of Windows Improper Access Control Vulnerability Exploited In Attacks Cyber Security News
React Native Packages Targeted by Credential-Stealing Malware React Native Packages Targeted by Credential-Stealing Malware Cyber Security News
Writable File in Lenovo’s Windows Directory Enables a Stealthy AppLocker Bypass Writable File in Lenovo’s Windows Directory Enables a Stealthy AppLocker Bypass Cyber Security News
Cybersecurity Newsletter Weekly – Discord, Red Hat Data Breach, 7-Zip Vulnerabilities and Sonicwall Firewall Hack Cybersecurity Newsletter Weekly – Discord, Red Hat Data Breach, 7-Zip Vulnerabilities and Sonicwall Firewall Hack Cyber Security News
France Adopts Linux for Government Workstations France Adopts Linux for Government Workstations Cyber Security News
15+ Weaponized npm Packages Attacking Windows Systems to Deliver Vidar Malware 15+ Weaponized npm Packages Attacking Windows Systems to Deliver Vidar Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Enhance SOC Efficiency with Strategic Threat Intelligence
  • Malware Compromises DAEMON Tools in Supply Chain Attack
  • Cisco Acquires Astrix to Bolster AI Identity Security
  • Apache HTTP/2 Vulnerability Exposes Systems to RCE and DoS
  • GnuTLS 3.8.13 Update: Key Security Vulnerabilities Fixed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Enhance SOC Efficiency with Strategic Threat Intelligence
  • Malware Compromises DAEMON Tools in Supply Chain Attack
  • Cisco Acquires Astrix to Bolster AI Identity Security
  • Apache HTTP/2 Vulnerability Exposes Systems to RCE and DoS
  • GnuTLS 3.8.13 Update: Key Security Vulnerabilities Fixed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark