All posts
Cybersecurity

DAEMON Tools Breached: Supply Chain Attack Backdoored Thousands

Huma Shazia6 May 2026 at 10:33 pm5 min read
DAEMON Tools Breached: Supply Chain Attack Backdoored Thousands

Key Takeaways

DAEMON Tools Breached: Supply Chain Attack Backdoored Thousands
Source: BleepingComputer
  • DAEMON Tools Lite version 12.5.1 was compromised since April 8, 2025, and distributed through official channels
  • Kaspersky found infections in over 100 countries, with a backdoor capable of executing commands and running code in memory
  • Users must uninstall version 12.5.1, run a full system scan, and install version 12.6 from the official site

Disc Soft Limited, the company behind DAEMON Tools Lite, has confirmed what security researchers discovered earlier this week: its software was compromised in a supply chain attack. Anyone who downloaded the free version of DAEMON Tools Lite from the official website since April 8 may have installed malware.

The company released version 12.6 on May 5 and says it has secured its infrastructure. But it has not identified the attackers or explained how they got in.

What Happened

In a statement published May 6, Disc Soft acknowledged the breach in measured terms.

Following an internal investigation, we identified unauthorized interference within our infrastructure. As a result, certain installation packages were impacted within our build environment and were released in a compromised state.

— Disc Soft Limited

The trojanized installers were digitally signed, which means Windows would have accepted them as legitimate software. Versions 12.5.0.2421 through 12.5.0.2434 were affected. These were available for download from the official DAEMON Tools website for nearly a month before the compromise was discovered.

Disc Soft says paid versions of DAEMON Tools Lite, along with DAEMON Tools Ultra and DAEMON Tools Pro, were not affected.

The Malware Chain

According to Kaspersky, which published its analysis on Tuesday, the attack was methodical and multi-stage.

When users ran the compromised installer, embedded malicious code deployed a payload designed to survive reboots. The first stage was an information stealer that collected:

  • Hostname and MAC address
  • Running processes
  • Installed software
  • System locale

This data was sent to attacker-controlled servers. Based on what they found, the attackers selectively pushed a second-stage payload to certain victims. This lightweight backdoor could execute commands, download files, and run code directly in memory, making it harder to detect.

In at least one case, Kaspersky observed a third component: QUIC RAT malware. This tool can inject malicious code into legitimate processes and supports multiple communication protocols, which helps it evade network monitoring.

Who Was Targeted

Kaspersky found infections in more than 100 countries. The victims included both individual users and organizations in retail, scientific research, government, and manufacturing sectors.

The countries most affected were Russia, Belarus, Thailand, Brazil, and Turkey. The geographic spread and the variety of targets suggest the attackers may have been casting a wide net rather than pursuing specific organizations.

What You Should Do

If you downloaded or installed DAEMON Tools Lite (free version) since April 8, Disc Soft recommends the following steps:

  1. Uninstall DAEMON Tools Lite version 12.5.1 immediately
  2. Run a full system scan using antivirus or security software
  3. Download and install version 12.6 from the official DAEMON Tools website

The company has removed the trojanized version from distribution. Users who try to run version 12.5.1 will now see a warning prompting them to update.

DAEMON Tools Lite 12.5.1 warning
DAEMON Tools Lite 12.5.1 now displays a warning urging users to install the clean version

Supply Chain Attacks Are Getting Harder to Spot

This incident follows a pattern that security teams have seen repeatedly. Attackers compromise a software vendor's build environment, inject malicious code, and let the vendor's own distribution channels do the work. Because the installers are signed with legitimate certificates, they pass most security checks.

The SolarWinds attack in 2020 was the highest-profile example. The 3CX breach in 2023 hit business communication software. Now DAEMON Tools joins the list. Each attack reaches thousands or millions of users through a single point of compromise.

Disc Soft has not said whether it will publish a detailed post-mortem or timeline. The investigation is ongoing.

ℹ️

Logicity's Take

The DAEMON Tools breach is another reminder that software supply chains are prime targets. If attackers can get into a vendor's build system, they can bypass every security measure you have. Organizations need to treat software updates with the same scrutiny as unknown downloads, especially for utilities with system-level access.

Frequently Asked Questions

Frequently Asked Questions

How do I know if my DAEMON Tools installation is compromised?

If you downloaded or installed DAEMON Tools Lite (free) version 12.5.1 between April 8 and May 5, 2025, from the official website, your system may be affected. Uninstall the software and run a full antivirus scan.

Are paid versions of DAEMON Tools affected?

No. Disc Soft says paid versions of DAEMON Tools Lite, DAEMON Tools Ultra, and DAEMON Tools Pro were not compromised.

What should I do if my system was infected?

Uninstall version 12.5.1, run a full system scan with reputable antivirus software, and monitor for unusual activity. If you handle sensitive data, consider a deeper forensic review.

Who is behind the attack?

Disc Soft has not attributed the attack to any specific threat actor. The investigation is ongoing.

Is version 12.6 safe to install?

According to Disc Soft, version 12.6 does not contain the compromised files and was released after the company secured its infrastructure.

ℹ️

Need Help Implementing This?

If your organization uses DAEMON Tools or needs to assess supply chain security risks, Logicity can connect you with security experts. Contact our team for guidance on incident response and software vetting practices.

Source: BleepingComputer

H

Huma Shazia

Senior AI & Tech Writer

Related Articles