By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
The Tech DiffThe Tech DiffThe Tech Diff
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Reading: “Daemon Tools App Compromised in Month-Long Supply Chain Attack”
Share
Font ResizerAa
The Tech DiffThe Tech Diff
Font ResizerAa
  • Computers
  • Phones
  • Technology
  • Wearables
Search
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Follow US
  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy
© Copyright 2022. All Rights Reserved By The Tech Diff.
The Tech Diff > Blog > Technology > “Daemon Tools App Compromised in Month-Long Supply Chain Attack”
Technology

“Daemon Tools App Compromised in Month-Long Supply Chain Attack”

Admin
Last updated: May 6, 2026 7:34 am
Admin
Share
“Daemon Tools App Compromised in Month-Long Supply Chain Attack”
SHARE

Contents
Emerging Threats from Supply Chain Attacks: The Case of Daemon ToolsUnderstanding the Threat: Backdoor functionalitiesGeographical Impact and Target SelectionThe Rising Tide of Supply Chain AttacksWhat Users Can Do to Protect Themselves

Emerging Threats from Supply Chain Attacks: The Case of Daemon Tools

In a distressing turn of events, Kaspersky has reported a series of targeted attacks leveraging a backdoor in widely-used software, notably Daemon Tools. This incident has raised significant concerns over supply chain vulnerabilities, making it imperative for users to understand these risks and take proactive measures.

-20% Cool MIDOLA Kids Bluetooth Headphones: 68H Playtime & Safe Sound!
Headphones

Cool MIDOLA Kids Bluetooth Headphones: 68H Playtime & Safe Sound!

$19.99 Original price was: $19.99.$15.99Current price is: $15.99.
Buy Now
-18% Experience Sony WH-1000XM5: Ultimate Noise-Canceling Bliss!
Headphones

Experience Sony WH-1000XM5: Ultimate Noise-Canceling Bliss!

$399.99 Original price was: $399.99.$328.00Current price is: $328.00.
Buy Now
-20% Altec Lansing Kid Safe Headphones: Sound, Safety & Style!
Headphones

Altec Lansing Kid Safe Headphones: Sound, Safety & Style!

$34.99 Original price was: $34.99.$27.95Current price is: $27.95.
Buy Now
Protect Your Privacy: CloudValley Ultra-Thin Webcam Covers
Computer & Accessories

Protect Your Privacy: CloudValley Ultra-Thin Webcam Covers

$6.99
Buy Now

Understanding the Threat: Backdoor functionalities

Kaspersky has identified two types of backdoors deployed during these attacks. The first, characterized as a “minimalistic backdoor,” is designed to execute commands, download files, and run shellcode payloads directly in memory. This stealthy approach makes detection significantly more challenging for antivirus programs and security systems.

The second backdoor, referred to as QUIC RAT, was found on a machine belonging to an educational institution in Russia. Early analyses suggest it is capable of injecting malicious payloads into legitimate processes like notepad.exe and conhost.exe. Furthermore, QUIC RAT supports a diverse array of command and control (C2) communication protocols, including HTTP, UDP, TCP, WSS, QUIC, DNS, and HTTP/3 – showcasing its sophisticated design and the attackers’ expertise.

Geographical Impact and Target Selection

According to Kaspersky’s research, around 100 organizations were affected primarily across countries such as Russia, Brazil, Turkey, Spain, Germany, France, Italy, and China. However, the telemetry data available to Kaspersky limits their visibility, as it primarily relies on information gathered through its own products.

The analysis revealed that approximately 10% of the infected systems belong to various businesses and organizations. Interestingly, most of the infected machines only received the simpler information collector payload. The more complex QUIC RAT, however, has been observed on a limited number of machines within government, scientific, manufacturing, and retail sectors in Russia, Belarus, and Thailand. This highly selective targeting suggests that the attackers are driven by specific objectives, whether it be cyberespionage or the pursuit of high-value data – a tactic often referred to as “big game hunting.”

The Rising Tide of Supply Chain Attacks

Recent trends indicate a worrying increase in supply chain attacks, with notable incidents impacting platforms like Trivy, Checkmarx, and Bitwarden, alongside over 150 packages available through open source repositories. In fact, the past year alone has seen at least six significant attacks illustrating the growing sophistication and frequency of such threats.

What Users Can Do to Protect Themselves

For users of Daemon Tools, it is crucial to prioritize security measures. Kaspersky strongly recommends thoroughly scanning machines with reputable antivirus software. Windows users, in particular, should be vigilant for indicators of compromise as outlined in Kaspersky’s advisories. For those with technical expertise, monitoring for “suspicious code injections into legitimate system processes,” especially from executables launched from accessible directories like Temp, AppData, or Public, can be particularly beneficial.

The threat landscape is rapidly evolving, underscoring the importance of remaining informed and prepared against sophisticated cyber threats. Understanding these risks and implementing proactive measures can make a significant difference in safeguarding sensitive information.

For detailed insights on the situation, you can read more here.

Image Credit: arstechnica.com

You Might Also Like

“Google Home’s Gemini AI Tackles Complex Requests Seamlessly”

Coinbase Cuts 14% of Workforce in Major Restructuring Effort

GameStop Proposes $56 Billion eBay Bid Amid Payment Uncertainty

“Nicolas Sauvage Invests in the Overlooked Aspects of AI”

“Amazon Pressured Nintendo to Violate Laws, Claims Reggie Fils-Aimé”

Share This Article
Facebook Twitter Copy Link Print
Previous Article “Honor Play 70C Launches: Massive 5,300mAh Battery and 6.75-Inch Display” “Honor Play 70C Launches: Massive 5,300mAh Battery and 6.75-Inch Display”
Next Article “Website Security Essentials: Protect Your Site with BigScoots”
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Product categories

  • Computer & Accessories
  • Headphones
  • Laptops
  • Phones
  • Wearables

Trending Products

  • FEELWORLD VM1: Pink Gaming Mic with RGB & Noise Cancellation! FEELWORLD VM1: Pink Gaming Mic with RGB & Noise Cancellation! $58.99
  • HP 14” Ultralight Laptop: Perfect for Students & Business! HP 14” Ultralight Laptop: Perfect for Students & Business! $249.99 Original price was: $249.99.$212.47Current price is: $212.47.
  • Upgrade Your Game: Ergonomic Wireless Mouse with 4 DPI Levels! Upgrade Your Game: Ergonomic Wireless Mouse with 4 DPI Levels! $12.99 Original price was: $12.99.$11.69Current price is: $11.69.
  • Coolby 15.6″ Win 11 Laptop: 16GB RAM, 512GB SSD, FHD! Coolby 15.6" Win 11 Laptop: 16GB RAM, 512GB SSD, FHD! $269.00
  • Comfort Fit TUDIA Snap On Case & Wristband for PLAUD NotePin Comfort Fit TUDIA Snap On Case & Wristband for PLAUD NotePin $24.99

You Might also Like

“Otarmeni: FDA Approves First Gene Therapy for Hereditary Deafness”
Technology

“Otarmeni: FDA Approves First Gene Therapy for Hereditary Deafness”

Admin Admin 5 Min Read
“AI Actors and Scripts Excluded from Oscar Eligibility”
Technology

“AI Actors and Scripts Excluded from Oscar Eligibility”

Admin Admin 4 Min Read
“Ubuntu Infrastructure Outage Enters Second Day, Users Left in Limbo”
Technology

“Ubuntu Infrastructure Outage Enters Second Day, Users Left in Limbo”

Admin Admin 2 Min Read

About Us

At The Tech Diff, we believe technology is more than just innovation—it’s a lifestyle that shapes the way we work, connect, and explore the world. Our mission is to keep readers informed, inspired, and ahead of the curve with fresh updates, expert insights, and meaningful stories from across the digital landscape.

Useful Link

  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy

Categories

  • Computers
  • Phones
  • Technology
  • Wearables

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

The Tech DiffThe Tech Diff
Follow US
© Copyright 2022. All Rights Reserved By The Tech Diff.
Welcome Back!

Sign in to your account

Lost your password?