Cybersecurity2 hrs ago

Kaspersky Finds Active Chinese-Linked Backdoor in Daemon Tools Since April

Kaspersky reports a supply-chain backdoor in Daemon Tools detected since April, linked to a Chinese-speaking group and used to install further malware.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn

No source-linked image is attached to this story yet. Measured Take avoids generic stock art when a relevant credited image is not available.

TL;DR: Kaspersky discovered a supply‑chain backdoor in Daemon Tools that has been active since April 8, allowing attackers to drop additional malware on select Windows machines. Disc Soft says it is investigating the claim with highest priority.

Context

Daemon Tools, a widely used Windows utility for creating virtual drives, was found to contain a malicious backdoor by Kaspersky researchers. Telemetry from Kaspersky antivirus shows a widespread infection affecting thousands of Windows hosts globally. The backdoor enables threat actors to execute arbitrary code on compromised systems, which they have used to install further malware on a dozen machines in retail, scientific, manufacturing, and government sectors.

Key Facts

- First detection: April 8, 2024. - Attribution: Kaspersky links the activity to a Chinese‑language speaking group based on malware code artifacts. - Impact: Targeted organizations located in Russia, Belarus, and Thailand; additional malware deployed on approximately 12 systems. - Nature of attack: Supply‑chain compromise where the legitimate Daemon Tools installer was trojanized. - No public CVE assigned yet; the technique aligns with MITRE ATT&CK T1195.002 (Compromise Software Dependencies and Development Tools).

What It Means

The incident underscores the growing risk of software supply‑chain attacks, where trusted utilities become vectors for espionage or sabotage. Organizations that rely on Daemon Tools should treat the software as potentially untrusted until a clean version is verified. The backdoor’s persistence suggests attackers may continue to push malicious updates through the compromised distribution channel.

Mitigations / What Defenders Should Do - Immediately audit systems for the presence of Daemon Tools and verify file hashes against Disc Soft’s official releases. - Block execution of Daemon Tools binaries that do not match known good signatures; apply application‑control policies. - Deploy detection rules for the identified backdoor behavior (e.g., unusual registry modifications, outbound connections to known C2 IPs) using YARA or Sigma rules aligned with MITRE T1059 (Command and Scripting Interpreter). - Monitor for post‑exploitation activity such as credential dumping (T1003) or lateral movement (T1021). - Keep an eye on Disc Soft’s security advisory for a patched build and apply it as soon as available.

Watch for Disc Soft’s official statement and any subsequent security updates that may reveal the full scope of the compromise.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...