:

CHINESE HACKERS BACKDOOR DAEMON TOOLS IN SUPPLY-CHAIN ATTACK

SECURITY DESK2 MIN READ
TUE, MAY 5, 2026

■ AI-SUMMARIZED FROM 3 SOURCES BELOW

Kaspersky reports that Chinese-linked hackers compromised DAEMON Tools installers and delivered a backdoor to thousands of Windows users who downloaded the software from its official website starting April 8.

The cybersecurity firm detected at least a dozen successful infections and thousands of additional infection attempts targeting users of the popular disk virtualization tool. The attack exploited DAEMON Tools' legitimate distribution channels, making it a classic supply-chain compromise. Victims downloaded trojanized versions of the software directly from official sources, meaning standard security checks may not have flagged the malicious installers. Once installed, the backdoor gave attackers persistent remote access to compromised systems. Attack Timeline The campaign ran for approximately one month before detection. Kaspersky identified the initial compromise on April 8, indicating the attackers maintained access to DAEMON Tools' distribution infrastructure for an extended period. Attribution Kaspersky attributes the attack to Chinese-speaking threat actors, though the company has not publicly confirmed specific group names or facilities involved. The targeting of a widely-used Windows utility suggests the attackers sought broad system access rather than targeting specific organizations. Response DAEMON Tools users should immediately verify their installation sources and check systems for signs of compromise. Kaspersky recommends downloading fresh copies only from verified official sources and scanning existing installations with updated security tools. The incident highlights ongoing risks in software distribution. Even legitimate software channels can be weaponized if attackers gain access to hosting infrastructure or update mechanisms. Users of DAEMON Tools and similar widely-distributed utilities should treat this as an urgent security matter. No statement from DAEMON Tools' parent company Disc Soft has been publicly released regarding the compromise or remediation steps being taken.

■ SOURCES

TechCrunchBleeping ComputerArs Technica

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

Ireland's media watchdog is investigating Meta for allegedly restricting users' ability to control what content appears in their Instagram and Facebook feeds. The probe centers on whether the company is violating users' right to choose their feed experience.

JUST NOWIndustry Desk

Education technology company Instructure has suffered a data breach compromising students' private information. TechCrunch reviewed samples of the allegedly stolen data confirming the breach.

1H AGOSecurity Desk

A 23-year-old university student in Taiwan was arrested for unauthorized access to the Taiwan High-Speed Rail (THSR) network's TETRA communication system. The breach allowed the student to trigger emergency brakes on the railway.

1H AGOAI Desk

The Federal Trade Commission will prohibit data broker Kochava and its subsidiary Collective Data Solutions from selling Americans' location data without explicit consent. The settlement resolves 2022 charges that the companies sold precise geolocation information from hundreds of millions of mobile devices.

5H AGOIndustry Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.