Emerging Threats from Supply Chain Attacks: The Case of Daemon Tools
In a distressing turn of events, Kaspersky has reported a series of targeted attacks leveraging a backdoor in widely-used software, notably Daemon Tools. This incident has raised significant concerns over supply chain vulnerabilities, making it imperative for users to understand these risks and take proactive measures.
Understanding the Threat: Backdoor functionalities
Kaspersky has identified two types of backdoors deployed during these attacks. The first, characterized as a “minimalistic backdoor,” is designed to execute commands, download files, and run shellcode payloads directly in memory. This stealthy approach makes detection significantly more challenging for antivirus programs and security systems.
The second backdoor, referred to as QUIC RAT, was found on a machine belonging to an educational institution in Russia. Early analyses suggest it is capable of injecting malicious payloads into legitimate processes like notepad.exe and conhost.exe. Furthermore, QUIC RAT supports a diverse array of command and control (C2) communication protocols, including HTTP, UDP, TCP, WSS, QUIC, DNS, and HTTP/3 – showcasing its sophisticated design and the attackers’ expertise.
Geographical Impact and Target Selection
According to Kaspersky’s research, around 100 organizations were affected primarily across countries such as Russia, Brazil, Turkey, Spain, Germany, France, Italy, and China. However, the telemetry data available to Kaspersky limits their visibility, as it primarily relies on information gathered through its own products.
The analysis revealed that approximately 10% of the infected systems belong to various businesses and organizations. Interestingly, most of the infected machines only received the simpler information collector payload. The more complex QUIC RAT, however, has been observed on a limited number of machines within government, scientific, manufacturing, and retail sectors in Russia, Belarus, and Thailand. This highly selective targeting suggests that the attackers are driven by specific objectives, whether it be cyberespionage or the pursuit of high-value data – a tactic often referred to as “big game hunting.”
The Rising Tide of Supply Chain Attacks
Recent trends indicate a worrying increase in supply chain attacks, with notable incidents impacting platforms like Trivy, Checkmarx, and Bitwarden, alongside over 150 packages available through open source repositories. In fact, the past year alone has seen at least six significant attacks illustrating the growing sophistication and frequency of such threats.
What Users Can Do to Protect Themselves
For users of Daemon Tools, it is crucial to prioritize security measures. Kaspersky strongly recommends thoroughly scanning machines with reputable antivirus software. Windows users, in particular, should be vigilant for indicators of compromise as outlined in Kaspersky’s advisories. For those with technical expertise, monitoring for “suspicious code injections into legitimate system processes,” especially from executables launched from accessible directories like Temp, AppData, or Public, can be particularly beneficial.
The threat landscape is rapidly evolving, underscoring the importance of remaining informed and prepared against sophisticated cyber threats. Understanding these risks and implementing proactive measures can make a significant difference in safeguarding sensitive information.
For detailed insights on the situation, you can read more here.
Image Credit: arstechnica.com






