Key Takeaways
- A supply‑chain compromise of DAEMON Tools injects malicious code into legitimate installers, all signed with a valid developer signature.
- The trojanized versions (12.5.0.2421‑12.5.0.2434) have been circulating since April 8 2026 and remain active.
- Infection triggers an information‑gatherer at startup; harvested system data is sent to a command‑and‑control (C2) server.
- Depending on the gathered intel, the C2 may return a minimalistic backdoor capable of downloading additional payloads, executing shell commands, and running shellcode in memory.
- The backdoor can deploy a more advanced implant called QUIC RAT, which supports multiple protocols and injects code into notepad.exe and conhost.exe.
- Victims span roughly 100 countries, with the majority being home users; about 10 % of infections hit organizations, notably government, scientific, manufacturing, and retail entities in Russia, Belarus, and Thailand.
- Detection relies on monitoring for abnormal startup processes, unusual network traffic to known C2 domains, and the presence of the compromised binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, DTShellHlp.exe).
- Protective measures include verifying software signatures, employing up‑to‑date endpoint security, and auditing any DAEMON Tools installations for signs of compromise since early April 2026.
Overview of the Attack
Kaspersky researchers uncovered a large‑scale supply‑chain attack that leveraged the popular optical‑drive‑emulation utility DAEMON Tools. Threat actors managed to inject malicious code into the official installers of the software, and every trojanized executable bears a valid digital signature from AVB Disc Soft, the legitimate developer. The compromised versions have been in circulation since April 8 2026, and the campaign is still ongoing at the time of reporting. Analysis indicates the operation is targeted rather than purely opportunistic, with the attackers selecting specific victims based on the data harvested from infected machines.
How the Software Was Trojanized
The malicious payload was embedded in three core components of DAEMON Tools: DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe. These files reside in the main installation directory and are launched during normal program operation. Because the binaries retain the original vendor’s digital signature, they bypass many signature‑based trust checks, allowing the malicious code to execute with the same privileges as the legitimate application. Versions ranging from 12.5.0.2421 through 12.5.0.2434 were found to be affected, indicating a relatively narrow but strategically chosen window of compromise.
Initial Infection Routine
Upon execution of any of the compromised binaries, a malicious stub is launched each time the host system boots. This stub contacts a pre‑programmed command‑and‑control (C2) server, transmitting a beacon that includes basic system identification. In response, the C2 may deliver further instructions, the first of which is typically an information‑gathering module. This collector enumerates a wide range of host attributes: MAC address, hostname, DNS domain name, list of running processes, installed software inventory, and language/locale settings. All of this data is exfiltrated to the attacker’s server over HTTPS, blending with legitimate traffic to evade detection.
Backdoor Deployment and Capabilities
Depending on the value of the harvested data, the C2 server may send a minimalistic backdoor to the victim. This backdoor is lightweight yet functional: it can download and execute additional payloads, accept arbitrary shell commands from the operator, and inject and run shellcode directly in the memory of legitimate processes. Its primary purpose is to act as a staging platform for more sophisticated tools. In several observed cases, the backdoor proceeded to deploy a fully featured remote access trojan dubbed QUIC RAT. QUIC RAT supports multiple communication protocols (including HTTP, HTTPS, and custom QUIC‑based channels) to maintain resilient contact with the C2 infrastructure. Notably, it is capable of injecting malicious code into high‑privilege user‑mode processes such as notepad.exe and conhost.exe, allowing attackers to execute commands under the guise of benign applications and to persist across reboots via legitimate‑looking executables.
Victimology and Geographic Spread
Telemetry collected by Kaspersky shows that several thousand installation attempts of the tainted DAEMON Tools package have been recorded since early April 2026. The overwhelming majority of these attempts—approximately 90 %—occurred on personal computers belonging to home users. Around 10 % were observed on systems within corporate or organizational networks. Geographically, the infection footprint spans roughly one hundred different countries and territories. The highest concentrations of affected machines were reported in Russia, Brazil, Turkey, Spain, Germany, France, Italy, and China. When the attack progressed beyond the information‑gathering stage, only a small subset of victims—about a dozen machines—received the QUIC RAT implant. These high‑value targets were located in government agencies, scientific research institutions, manufacturing firms, and retail businesses, primarily in Russia, Belarus, and Thailand.
Indicators of Compromise and Defensive Recommendations
Security teams should monitor for the following IOCs associated with this campaign:
- Presence of the files DTHelper.exe, DiscSoftBusServiceLite.exe, or DTShellHlp.exe with timestamps or version numbers falling within the 12.5.0.2421‑12.5.0.2434 range, especially if they exhibit unexpected network activity.
- Outbound HTTPS connections to unfamiliar domains or IP addresses that receive POST requests containing JSON‑like payloads with fields such as “mac,” “hostname,” “processes,” or “software.”
- Execution of unknown processes spawned from the DAEMON Tools directory, particularly those that attempt to inject code into notepad.exe or conhost.exe.
- Creation of scheduled tasks or registry run‑keys that point to executables within the DAEMON Tools installation path.
To mitigate risk, organizations and home users alike should:
- Verify the integrity of any DAEMON Tools installer by checking its digital signature against the publisher’s official certificate; any mismatch warrants immediate rejection.
- Deploy endpoint protection solutions that include behavioral detection and can block unauthorized process injection or anomalous outbound connections.
- Conduct regular audits of systems where DAEMON Tools is installed, looking for the IOCs listed above, especially if the software was installed or updated after April 8 2026.
- Apply the principle of least privilege: ensure that DAEMON Tools runs with only the permissions necessary for its function, limiting the ability of any malicious component to escalate privileges or access sensitive data.
- Keep all software, including DAEMON Tools, up to date with patches from the official vendor, and consider disabling the program on critical assets unless absolutely required.
By combining vigilant monitoring, signature validation, and robust endpoint defenses, users can detect and neutralize this supply‑chain threat before it enables further espionage or data‑theft operations.
Conclusion
The DAEMON Tools supply‑chain incident demonstrates how attackers can abuse trusted software distribution channels to deliver stealthy, persistent threats. Although the initial infection stage is relatively noisy—triggering a startup beacon and data harvest—the subsequent deployment of a flexible backdoor and the QUIC RAT implant showcases a sophisticated, multi‑stage attack chain capable of adapting to the victim’s environment. The campaign’s broad geographic reach, combined with a focused effort on high‑value targets, underscores the importance of verifying software authenticity and maintaining continuous visibility into endpoint behavior. Organizations that adopt the recommended detection and mitigation practices will be well positioned to defend against this and similar supply‑chain threats in the future.

