Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Spot Uptick in Use of Vercel for Phishing Campaigns

May 7, 2026

Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About

May 7, 2026

Daemon Tools Developer Confirms Software Was Trojanized

May 7, 2026
Facebook X (Twitter) Instagram
Thursday, May 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Daemon Tools Developer Confirms Software Was Trojanized
Cyber Security

Daemon Tools Developer Confirms Software Was Trojanized

Team-CWDBy Team-CWDMay 7, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The developer of a popular utility software application has been forced to release a new version after confirming reports that threat actors managed to hide malware in a previous iteration.

Disc Soft said it released the malware-free Version 12.6 of its Daemon Tools Lite product on May 5, less than 12 hours after being notified of the supply chain attack.

“Following an internal investigation, we identified unauthorized interference within our infrastructure,” it confirmed in a post on May 7.

“As a result, certain installation packages were impacted within our build environment and were released in a compromised state.”

Read more on supply chain campaigns: North Korean APT Targets Yanbian Gamers via Trojanized Platform

Disc Soft said the incident has now been contained and there’s no ongoing risk for users, after it isolated and secure affected systems and removed all potentially compromised files from distribution.

The firm said it also audited the build and release pipeline, rebuilt and validated installation packages, and strengthened internal security controls and monitoring systems.

“All currently available versions of Daemon Tools Lite have been verified to ensure their integrity and safety,” it added. “The affected version (12.5.1) has been removed and is no longer supported. The latest version (12.6.0.2445) no longer exhibits the behavior associated with the incident.”

The developer urged any user who downloaded the affected version to:

  • Uninstall the application
  • Run a full system scan using trusted security software
  • Download the latest version from the official website

A China-Linked Backdoor Campaign

Earlier this week, Kaspersky warned that Daemon Tools software installers distributed from the main website had been Trojanized since April 8.

“Starting from early April, we observed several thousands of infection attempts involving Daemon Tools in our telemetry, with individuals and organizations in more than 100 countries being affected,” the cybersecurity firm explained.

“However, out of all the machines infected, we have observed further-stage payloads being deployed to only a dozen of them. These machines that received further payloads belonged to retail, scientific, government and manufacturing organizations – and this indicates that the supply chain attack has a targeted manner.”

It’s unclear what the end goal was – Kaspersky posited both cyber-espionage and “big-game hunting.” However, it observed one victim organization, an education institution in Russia, which had been infected with the Quic RAT malware, which is capable of injecting payloads into notepad.exe and conhost.exe processes.

Most victims were apparently located in Russia, Brazil, Turkey, Spain, Germany, France, Italy and China.

“Given the high complexity of the attack, it is paramount for organizations to carefully examine machines that had Daemon Tools installed, for abnormal cybersecurity-related activities that occurred on or after April 8,” Kaspersky concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFixing trivial passwords is as easy as 123456
Next Article Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About
Team-CWD
  • Website

Related Posts

Cyber Security

Five Years On: Lessons Learned From the Colonial Pipeline Cyber-Attack

May 6, 2026
Cyber Security

Trellix Reveals Unauthorized Access to Source Code

May 5, 2026
Cyber Security

Why Organizations Need to do Protect Against Phishing-as-a-Service

May 1, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

It’s all fun and games until someone gets hacked

September 26, 2025

Mobile app permissions (still) matter more than you may think

February 27, 2026

Your information is on the dark web. What happens next?

January 13, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.