Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Compromises DAEMON Tools in Supply Chain Attack

Malware Compromises DAEMON Tools in Supply Chain Attack

Posted on May 5, 2026 By CWS

A recent supply chain attack has targeted DAEMON Tools software, compromising its installers to distribute malware, according to Kaspersky’s latest findings. This attack highlights vulnerabilities in software distribution processes, raising concerns among users and cybersecurity professionals worldwide.

Attack Details and Impact

The compromised installers, originating from DAEMON Tools’ legitimate website, have been signed with valid digital certificates from the developers. Kaspersky researchers, including Igor Kuznetsov and Leonid Bezvershenko, have identified the affected versions as ranging from 12.5.0.2421 to 12.5.0.2434, with the breach starting on April 8, 2026. The situation remains active, and AVB Disc Soft, the software’s developer, has been informed.

Key components compromised in this attack include DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe. These files, when executed, trigger an implant that communicates with an external server to execute further commands, potentially downloading additional malicious payloads.

Global Reach and Targeted Approach

The malware has attempted to infect thousands of systems globally, affecting users in over 100 countries, such as Russia, Brazil, and Germany. Despite the widespread infection attempts, the subsequent payload delivery has been restricted to a select few, indicating a targeted cyberattack approach.

Specific targets identified include organizations in retail, science, and government sectors, notably in Russia and Thailand. Among the payloads is a remote access trojan known as QUIC RAT, which has been deployed against particular entities, suggesting a strategic intent behind the attack.

Technical Analysis and Attribution

The malware employs diverse command-and-control protocols and can inject code into processes like notepad.exe, making detection and prevention challenging. Although the attack has not been linked to a specific threat actor, analysis suggests the involvement of a Chinese-speaking group.

This incident adds to a series of supply chain attacks in 2026, following breaches involving eScan and Notepad++. The use of trusted, digitally signed software by users has enabled the attack to evade detection for a significant period, underscoring the sophistication of the threat actor.

Future Implications

The DAEMON Tools breach exemplifies the increasing complexity of cyber threats and the need for vigilance in software integrity. Organizations are advised to isolate affected systems and conduct thorough security audits to mitigate further risks. As supply chain attacks grow more prevalent, strengthening cybersecurity measures remains crucial to safeguarding digital infrastructure.

The Hacker News Tags:cyber threat, Cybersecurity, DAEMON Tools, digital certificates, endpoint security, Kaspersky, Malware, malware payload, Software Security, supply chain attack

Post navigation

Previous Post: Cisco Acquires Astrix to Bolster AI Identity Security
Next Post: Enhance SOC Efficiency with Strategic Threat Intelligence

Related Posts

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users The Hacker News
Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server The Hacker News
Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware The Hacker News
How Passwork 7 Addresses Complexity of Enterprise Security How Passwork 7 Addresses Complexity of Enterprise Security The Hacker News
Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools The Hacker News
ZAST.AI Secures M to Enhance AI-Driven Code Security ZAST.AI Secures $6M to Enhance AI-Driven Code Security The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerabilities in Qualcomm Chipsets Risk Remote Exploits
  • Weaver E-cology RCE Flaw Under Active Exploitation
  • Enhance SOC Efficiency with Strategic Threat Intelligence
  • Malware Compromises DAEMON Tools in Supply Chain Attack
  • Cisco Acquires Astrix to Bolster AI Identity Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerabilities in Qualcomm Chipsets Risk Remote Exploits
  • Weaver E-cology RCE Flaw Under Active Exploitation
  • Enhance SOC Efficiency with Strategic Threat Intelligence
  • Malware Compromises DAEMON Tools in Supply Chain Attack
  • Cisco Acquires Astrix to Bolster AI Identity Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark