Daemon Tools Backdoor: Month-Long Supply Chain Attack

Daemon Tools disk image software compromised in monthlong supply-chain attack. Malicious updates pushed from official servers targeting Windows users worldwide.
A significant supply-chain attack has compromised Daemon Tools, one of the most widely used applications for mounting and managing disk images across Windows systems. Security researchers at Kaspersky confirmed that the popular software has been subjected to a sophisticated backdoor attack that began in early April and remained actively distributing malicious code at the time of disclosure. This represents a critical threat to users who trusted the application's official distribution channels, as the compromised installers were digitally signed with the developer's legitimate certificate and distributed through their official website.
The attack, which Kaspersky first reported on Tuesday, demonstrates how threat actors can exploit trusted software distribution mechanisms to deliver malware at scale. The compromised versions of Daemon Tools—specifically versions 12.5.0.2421 through 12.5.0.2434—have been engineered to automatically execute malicious code at system boot time. Users who downloaded and installed these versions during the affected timeframe received trojanized executables that appeared legitimate due to the proper digital signatures. The fact that the malware persists through system restarts makes it particularly difficult for casual users to detect and remove without specialized security knowledge.
According to technical analysis provided by Kaspersky, the backdoor infection appears to exclusively target Windows operating systems, leaving macOS and Linux users unaffected by this particular campaign. The developer AVB, responsible for Daemon Tools, has not yet provided official comment on the extent of the compromise or their response measures. Security experts noted that the use of valid digital certificates makes this type of attack extraordinarily difficult for end-users to defend against, as standard security warnings and validation checks pass without triggering suspicion.
The initial malware payload contained within the infected versions performs extensive system reconnaissance, collecting sensitive information that provides attackers with valuable reconnaissance data. The malicious code gathers MAC addresses, system hostnames, DNS domain names, lists of running processes, installed software inventories, and system locale settings. This information is then transmitted to attacker-controlled command and control servers, allowing threat actors to build a detailed profile of each infected system and its environment. The data collection phase represents a typical early stage in sophisticated targeted attacks, where attackers assess which systems warrant further exploitation.
The scale of this security incident is substantial, with Kaspersky documenting that thousands of machines across more than 100 countries have been infected through the compromised Daemon Tools updates. This global distribution underscores the reach and impact of supply-chain attacks that leverage legitimate software distribution channels. The widespread nature of the initial infection—affecting thousands of systems—demonstrates how effective this attack vector can be when targeting popular applications with large user bases.
However, the attack appears to follow a selective targeting strategy, with attackers carefully choosing which infected systems receive additional malicious payloads. Out of the thousands of machines initially compromised with the reconnaissance malware, only approximately 12 systems have been elevated to receive follow-on payloads containing more sophisticated or targeted malware. These selected targets belong to organizations in the retail, scientific, government, and manufacturing sectors, indicating that the attackers are pursuing specific objectives against particular industries or organizations. This secondary targeting phase strongly suggests this is a targeted supply-chain campaign rather than indiscriminate malware distribution.
The methodology employed by the attackers reveals a sophisticated understanding of how to exploit software supply chains effectively. By compromising the official distribution channel and maintaining valid digital signatures, threat actors bypassed many traditional security controls that organizations rely upon to protect against malware. Users following best practices—such as downloading software only from official sources and verifying digital signatures—would still have been infected by this campaign, making it a particularly insidious form of attack that exploits the trust relationship between software developers and their users.
Security researchers emphasize that this incident highlights the critical importance of software transparency and rapid communication from developers when supply-chain compromises are discovered. The continued active distribution of malicious updates at the time of Kaspersky's disclosure suggests that the attack remained undetected for an extended period, during which thousands of additional users could have been compromised. This timeline raises important questions about how long the developer's infrastructure remained under attacker control and what additional systems may have been accessed during the monthlong campaign.
The implications of this Daemon Tools compromise extend beyond individual users to enterprise environments where the software is commonly used for system administration, testing, and development purposes. Organizations running Daemon Tools in their infrastructure may need to conduct comprehensive system audits to identify which machines were compromised during the affected version timeframe. The reconnaissance data collected by the initial payload could provide attackers with valuable intelligence about enterprise networks, potentially leading to further intrusions or data theft.
Kaspersky's discovery and disclosure of this attack represents an important service to the broader security community, as it alerts users and organizations to the threat and provides technical details that help security teams identify affected systems. The security firm's analysis provides forensic evidence of how the attack was conducted and what indicators organizations can look for to determine if their systems were compromised. However, the fact that neither Kaspersky nor the developer could be contacted immediately for additional details raises concerns about coordination and communication during active security incidents.
Users of Daemon Tools should immediately check their installed version and update to the latest patched release if they have installed any version between 12.5.0.2421 and 12.5.0.2434. Organizations should also conduct system scans using updated antivirus and endpoint detection tools, looking for signs of the malware or any suspicious outbound connections to command and control servers. The incident response process may require more than simply updating the software, as systems that received follow-on payloads may have additional backdoors or persistent access mechanisms installed that require specialized forensic investigation and remediation.
This supply-chain attack serves as a sobering reminder of the evolving threat landscape facing software users and organizations worldwide. The sophisticated exploitation of legitimate distribution channels and valid digital certificates demonstrates that attackers continue to find innovative ways to compromise systems despite traditional security controls. As software supply chains become increasingly complex and interconnected, the potential impact of such attacks grows, making it essential for both developers and users to maintain vigilance and implement layered security strategies that can detect and respond to compromised software before widespread damage occurs.
Source: Ars Technica


