In early May 2026, it was discovered that installers for **DAEMON Tools**, a popular software for mounting disk images, were compromised with malicious payloads. These compromised installers were distributed through the legitimate DAEMON Tools website and were signed with valid digital certificates from the developers, AVB Disc Soft 【1】. The trojanized installers have been active since April 8, 2026, affecting versions of DAEMON Tools from 12.5.0.2421 to 12.5.0.2434 【1】. This supply chain attack is ongoing 【1】.
**Who is Affected:**
The attack is widespread, with thousands of infection attempts observed in over 100 countries, impacting both individuals and organizations 【1】. However, the attackers have deployed more advanced payloads in a targeted manner to a limited number of machines, specifically around a dozen, belonging to government, scientific, manufacturing, and retail organizations in Russia, Belarus, and Thailand 【1】.
**Security Implications:**
The compromise allows attackers to gain a foothold on affected systems, enabling them to collect sensitive information and execute further malicious code. The use of legitimate digital certificates for the compromised installers bypasses initial security checks, making detection more challenging 【1】. The targeted deployment of advanced payloads suggests potential motives such as cyberespionage or "big game hunting" 【1】.
**Technical Details:**
The compromise involves a backdoor implanted in the startup code of specific DAEMON Tools binaries: `DTHelper.exe`, `DiscSoftBusServiceLite.exe`, and `DTShellHlp.exe` 【1】. When these binaries launch, the backdoor contacts a malicious server (`env-check.daemontools[.]cc`), which is a typosquatted domain designed to mimic the legitimate DAEMON Tools domain 【1】.
Observed payloads include:
* **Information Collector (`envchk.exe`):** A .NET executable that gathers system information such as MAC address, hostname, DNS domain name, running processes, installed software, and system locale. This executable contains Chinese strings, suggesting a possible Chinese-speaking threat actor 【1】.
* **Minimalistic Backdoor:** A shellcode loader that decrypts and executes a backdoor in memory. This backdoor can download files, execute shell commands, and run other shellcode payloads 【1】.
* **QUIC RAT:** A more sophisticated implant observed on a single organization's machine. It supports multiple command and control (C2) communication protocols (HTTP, UDP, TCP, WSS, QUIC, DNS, HTTP/3) and can perform process injection into legitimate processes like `notepad.exe` and `conhost.exe` 【1】.
**What Defenders Should Know:**
Defenders should inspect machines that had DAEMON Tools installed on or after April 8, 2026, for abnormal activity 【1】. Key indicators to monitor include:
* Suspicious code injections into legitimate system processes (e.g., `notepad.exe`, `conhost.exe`) 【1】.
* Suspicious PowerShell or CMD activity used to download files from external sources 【1】.
* The presence of the compromised DAEMON Tools binaries (`DTHelper.exe`, `DiscSoftBusServiceLite.exe`, `DTShellHlp.exe`) 【1】.
* Network connections to suspicious domains like `env-check.daemontools[.]cc` 【1】.