CHINESE HACKERS BACKDOOR DAEMON TOOLS IN SUPPLY-CHAIN ATTACK
SECURITY DESK■ 2 MIN READ
TUE, MAY 5, 2026■ AI-SUMMARIZED FROM 3 SOURCES BELOW
Kaspersky reports that Chinese-linked hackers compromised DAEMON Tools installers and delivered a backdoor to thousands of Windows users who downloaded the software from its official website starting April 8.
The cybersecurity firm detected at least a dozen successful infections and thousands of additional infection attempts targeting users of the popular disk virtualization tool. The attack exploited DAEMON Tools' legitimate distribution channels, making it a classic supply-chain compromise.
Victims downloaded trojanized versions of the software directly from official sources, meaning standard security checks may not have flagged the malicious installers. Once installed, the backdoor gave attackers persistent remote access to compromised systems.
Attack Timeline
The campaign ran for approximately one month before detection. Kaspersky identified the initial compromise on April 8, indicating the attackers maintained access to DAEMON Tools' distribution infrastructure for an extended period.
Attribution
Kaspersky attributes the attack to Chinese-speaking threat actors, though the company has not publicly confirmed specific group names or facilities involved. The targeting of a widely-used Windows utility suggests the attackers sought broad system access rather than targeting specific organizations.
Response
DAEMON Tools users should immediately verify their installation sources and check systems for signs of compromise. Kaspersky recommends downloading fresh copies only from verified official sources and scanning existing installations with updated security tools.
The incident highlights ongoing risks in software distribution. Even legitimate software channels can be weaponized if attackers gain access to hosting infrastructure or update mechanisms. Users of DAEMON Tools and similar widely-distributed utilities should treat this as an urgent security matter.
No statement from DAEMON Tools' parent company Disc Soft has been publicly released regarding the compromise or remediation steps being taken.
■ MORE FROM THE SECURITY DESK
Ireland's media watchdog is investigating Meta for allegedly restricting users' ability to control what content appears in their Instagram and Facebook feeds. The probe centers on whether the company is violating users' right to choose their feed experience.
JUST NOW— Industry Desk
Education technology company Instructure has suffered a data breach compromising students' private information. TechCrunch reviewed samples of the allegedly stolen data confirming the breach.
1H AGO— Security Desk
A 23-year-old university student in Taiwan was arrested for unauthorized access to the Taiwan High-Speed Rail (THSR) network's TETRA communication system. The breach allowed the student to trigger emergency brakes on the railway.
1H AGO— AI Desk
The Federal Trade Commission will prohibit data broker Kochava and its subsidiary Collective Data Solutions from selling Americans' location data without explicit consent. The settlement resolves 2022 charges that the companies sold precise geolocation information from hundreds of millions of mobile devices.
5H AGO— Industry Desk