Daemon Tools Compromised in Supply-Chain Attack Affecting Thousands Globally
Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack
Ars Technica
Image: Ars Technica
Daemon Tools, a popular disk image mounting application, was compromised in a month-long supply-chain attack that began on April 8, affecting thousands of users worldwide. Malicious updates were pushed from the developer's servers, compromising Windows versions 12.5.0.2421 to 12.5.0.2434 and targeting specific organizations in various sectors.
- 01Daemon Tools was backdoored in a supply-chain attack starting April 8.
- 02Infected versions include Windows versions 12.5.0.2421 to 12.5.0.2434.
- 03The malware collects sensitive system information and sends it to an attacker-controlled server.
- 04About 12 machines in sensitive sectors received follow-on payloads.
- 05Supply-chain attacks like this are difficult to defend against and often go undetected for weeks.
Advertisement
In-Article Ad
Daemon Tools, a widely used application for mounting disk images, has been compromised in a sophisticated supply-chain attack that began on April 8. Researchers from Kaspersky reported that malicious updates were pushed from the developer's official servers, affecting Windows versions 12.5.0.2421 through 12.5.0.2434. The infected software collects sensitive data such as MAC addresses, hostnames, and installed software, which is then sent to an attacker-controlled server. Thousands of machines across more than 100 countries were targeted, with about 12 machines belonging to retail, scientific, government, and manufacturing organizations receiving additional malicious payloads. This incident highlights the challenges of defending against supply-chain attacks, which often exploit trusted update channels. Kaspersky emphasized the need for organizations to scrutinize systems with Daemon Tools installed for unusual cybersecurity activities since the attack started.
Advertisement
In-Article Ad
Organizations using Daemon Tools may need to conduct thorough security audits to identify potential breaches and protect sensitive data.
Advertisement
In-Article Ad
Reader Poll
Do you believe supply-chain attacks pose a significant threat to cybersecurity?
Connecting to poll...
Read the original article
Visit the source for the complete story.


