Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Daemon Tools Supply Chain Breach Managed, Says Vendor

Daemon Tools Supply Chain Breach Managed, Says Vendor

Posted on May 7, 2026 By CWS

Disc Soft, the developer behind Daemon Tools, has acknowledged a security breach that resulted in a supply chain attack. The compromise was unveiled earlier this week when cybersecurity firm Kaspersky alerted that numerous computers had potentially downloaded malware-laden versions of Daemon Tools from the official website.

Discovery of the Security Breach

Kaspersky’s investigation revealed that the attack, attributed to Chinese-speaking cybercriminals, involved injecting malicious code into Daemon Tools versions released between April 8 and May 5. This code was programmed to download and execute an information-stealing application. Among the thousands of compromised systems, the attackers specifically targeted a select few, installing a backdoor on approximately a dozen devices and a more sophisticated backdoor on a Russian educational institution.

Targeted Organizations and Response

The initial backdoor was detected in various sectors, including government, scientific, manufacturing, and retail organizations across Belarus, Russia, and Thailand. In response to these revelations, Disc Soft confirmed on Wednesday that certain installation files had been compromised but emphasized that the impact was restricted to the free version of Daemon Tools Lite.

Following the breach disclosure, Disc Soft acted swiftly to isolate and secure the affected systems. They removed potentially compromised files from distribution channels, reconstructed and verified the installation packages, and released a clean version of Daemon Tools Lite, version 12.6.0.2445, on May 5.

Ongoing Investigation and User Instructions

Disc Soft stated that their investigation is still ongoing as they work to determine the root cause and full extent of the breach. Although they have not attributed the attack to any specific third party, they are conducting a thorough review of their infrastructure to gain a complete understanding of the incident. The company clarified that only Daemon Tools Lite version 12.5.1 was affected, and no other products, such as Daemon Tools Ultra and Pro, were compromised.

Users who downloaded the affected software version are advised to uninstall Daemon Tools Lite and perform a malware scan on their systems. To prevent similar incidents in the future, Disc Soft is enhancing their verification procedures.

Related news links provide insights into other recent supply chain attacks, including vulnerabilities in Gemini CLI and SAP NPM packages, as well as a flaw in MCP that could potentially lead to widespread AI supply chain attacks.

Security Week News Tags:Backdoor, cyber threat, Cybersecurity, DAEMON Tools, Disc Soft, hacking incident, IT infrastructure, IT security, Kaspersky, Malware, Software Security, supply chain attack, system vulnerability, Threat Actors, Trojan

Post navigation

Previous Post: PCPJack Compromises Cloud Systems Using 5 CVEs
Next Post: Hackers Exploit Google Ads to Target ManageWP Users

Related Posts

Zero-Day Flaw in TrueConf Exploited by Hackers Zero-Day Flaw in TrueConf Exploited by Hackers Security Week News
Critical HPE OneView Vulnerability Exploited in Attacks Critical HPE OneView Vulnerability Exploited in Attacks Security Week News
Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack Security Week News
Critical Windows Server WSUS Vulnerability Exploited in the Wild  Critical Windows Server WSUS Vulnerability Exploited in the Wild  Security Week News
Gravwell Closes .4M Funding Round to Expand Data Analytics and Security Platform Gravwell Closes $15.4M Funding Round to Expand Data Analytics and Security Platform Security Week News
Data Breach Affects 250,000 at Nacogdoches Hospital Data Breach Affects 250,000 at Nacogdoches Hospital Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cisco Resolves Critical Flaws in Enterprise Solutions
  • Hackers Exploit Google Ads to Target ManageWP Users
  • Daemon Tools Supply Chain Breach Managed, Says Vendor
  • PCPJack Compromises Cloud Systems Using 5 CVEs
  • Palo Alto Networks Faces Ongoing Zero-Day Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cisco Resolves Critical Flaws in Enterprise Solutions
  • Hackers Exploit Google Ads to Target ManageWP Users
  • Daemon Tools Supply Chain Breach Managed, Says Vendor
  • PCPJack Compromises Cloud Systems Using 5 CVEs
  • Palo Alto Networks Faces Ongoing Zero-Day Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark