DAEMON Tools Trojanized Since April—Backdoor Hit 100+ Countries
Kaspersky uncovered a supply chain attack on DAEMON Tools official website. Trojanized installers deployed QUIC RAT backdoors to thousands of systems, with a dozen government and manufacturing targets receiving advanced payloads.
DAEMON Tools, the popular virtual drive emulation software, served backdoored installers from its official website for nearly a month before Kaspersky researchers caught the compromise. The supply chain attack infected systems in over 100 countries, with a smaller subset of government and manufacturing targets receiving a sophisticated second-stage RAT.
Kaspersky's Global Research and Analysis Team disclosed that trojanized installers shipped from April 8 through early May, delivering malware alongside the legitimate application.
Timeline and Scope
- March 27, 2026 - Attackers registered the C2 domain
env-check.daemontools[.]cc - April 8, 2026 - Trojanized installers began distribution from the official site
- May 5, 2026 - Compromise publicly disclosed; patched version 12.6.0.2445 released
Affected versions range from 12.5.0.2421 through 12.5.0.2434. Only DAEMON Tools Lite (the free version) was compromised—Pro and Ultra editions remained clean.
How the Attack Works
The malware embeds itself through three compromised binaries: DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe. On system startup, these trigger a multi-stage payload chain:
- envchk.exe - Collects system fingerprinting data: hostname, MAC address, running processes, installed software, locale
- cdg.exe - Decrypts and executes a minimalist shellcode loader
- QUIC RAT - Final payload supporting HTTP, UDP, TCP, WSS, QUIC, DNS, and HTTP/3 protocols for C2 communication
The protocol diversity is notable. QUIC traffic blends with legitimate browser connections, DNS tunneling evades network monitoring, and HTTP/3 support suggests the attackers anticipated modern network inspection tools.
Targeted vs. Opportunistic
Kaspersky observed thousands of infection attempts across Russia, Brazil, Turkey, Spain, Germany, France, Italy, and China. But only about a dozen systems received the advanced backdoor—specifically retail, scientific, government, and manufacturing organizations in Russia, Belarus, and Thailand.
This two-tier approach suggests the attackers cast a wide net through the supply chain compromise, then selectively deployed sophisticated tooling against high-value targets. The pattern resembles similar APT tradecraft we've covered, where initial access campaigns filter victims before committing advanced capabilities.
Attribution Points to China
Kaspersky assessed the attack was "the work of a Chinese-speaking adversary" based on artifact analysis, though they stopped short of naming a specific group. The targeting of government and scientific entities, combined with the selective deployment of advanced payloads, fits the profile of Chinese state-sponsored operations.
However, researchers noted the intent remains unclear—the campaign could represent cyber espionage or "big game hunting" for future ransomware deployment.
Detection and Remediation
If you downloaded DAEMON Tools Lite between April 8 and May 5:
- Uninstall the affected version immediately
- Run a full system scan with updated antivirus signatures
- Check for persistence mechanisms - Look for unusual scheduled tasks or services
- Monitor network traffic for connections to
env-check.daemontools[.]ccand related infrastructure - Update to version 12.6 or later from the official site (now clean)
Organizations should check endpoint detection logs for the following indicators:
- Process creation from DTHelper.exe, DiscSoftBusServiceLite.exe, or DTShellHlp.exe spawning unexpected children
- Outbound QUIC or DNS traffic to unusual destinations
- Memory-resident payloads injected into notepad.exe or conhost.exe
The Supply Chain Problem
DAEMON Tools has been around since 2000 and maintains a substantial installed base among users who need virtual drive functionality. The software's legitimate use case made it an attractive supply chain target—users trust the official download page, and security tools typically whitelist the application.
This attack joins a growing list of supply chain compromises targeting popular software. For defenders, the lesson is clear: download verification, software bill of materials tracking, and behavioral monitoring are essential even for trusted applications. The vendor's website is not a security guarantee.
Why This Matters
Supply chain attacks scale. One compromise reaches every user who downloads during the attack window, without requiring phishing, social engineering, or exploit development against individual targets. The attackers in this case traded stealth for reach—thousands of infections for the cost of compromising one build pipeline.
For organizations evaluating software supply chain risk, this incident demonstrates that even niche utilities can become vectors for sophisticated threat actors.
Related Articles
Smart Slider Hijacked: 900K WordPress Sites Get Backdoored
Attackers compromised Nextend's update infrastructure to push a malicious Smart Slider 3 Pro version with four layers of backdoors. Here's who's affected and how to recover.
Apr 9, 2026DEEP#DOOR Backdoor Harvests Passwords, Cloud Tokens, SSH Keys
Securonix uncovers DEEP#DOOR, a Python-based backdoor that steals browser passwords, AWS/Azure credentials, and SSH keys while evading detection through bore.pub tunneling and extensive anti-analysis.
May 4, 202673 GlassWorm Sleeper Extensions Found in Open VSX Marketplace
Socket researchers identify 73 malicious VS Code extensions on Open VSX tied to GlassWorm campaign. Six already activated to deliver malware through native binaries and obfuscated JavaScript.
Apr 27, 2026Bitwarden CLI Compromised in Shai-Hulud Supply Chain Attack
A malicious npm package hijacked Bitwarden CLI's publishing pipeline on April 22, harvesting credentials from 334 developers. Here's what happened.
Apr 25, 2026