Back to news
NewsMay 6, 2026· 2 min read

Daemon Tools backdoored for month, hit 100+ orgs worldwide

Supply-chain attack on popular disk utility deployed targeted backdoors to government and scientific institutions across eight countries.

By Agentic DailyVerified Source: Ars Technica

Our Take

The selective deployment pattern suggests nation-state actors testing infrastructure access rather than mass cybercrime.

Why it matters

Daemon Tools has millions of users globally, and this attack shows how utility software can become high-value espionage vectors. The monthlong persistence window means compromise detection is now critical.

Do this week

IT teams: Audit all machines running Daemon Tools for IOCs in Kaspersky's report before Friday to identify persistent backdoors.

Daemon Tools compromised for targeted espionage

Kaspersky discovered a supply-chain attack against Daemon Tools, the widely-used disk mounting software, that infected over 100 organizations across Russia, Brazil, Turkey, Spain, Germany, France, Italy, and China (per Kaspersky telemetry). The attack ran for approximately one month before detection.

Attackers deployed two distinct payloads. Most infected machines received only an information collector, but a dozen high-value targets at government, scientific, manufacturing and retail organizations received a sophisticated backdoor called QUIC RAT. This backdoor injects payloads into notepad.exe and conhost.exe processes and supports multiple command-and-control protocols including HTTP, UDP, TCP, WebSocket Secure, QUIC, DNS, and HTTP/3.

One educational institution in Russia also received what Kaspersky termed a "minimalistic backdoor" capable of executing commands, downloading files, and running shellcode in memory to evade detection.

Utility software becomes espionage infrastructure

The selective targeting pattern indicates sophisticated threat actors conducting reconnaissance rather than opportunistic cybercrime. Only 10% of affected systems belonged to businesses and organizations, with the complex backdoor reserved for specific government and scientific institutions (per Kaspersky analysis).

This follows a surge in supply-chain attacks hitting developer tools and utilities. Recent months saw compromises of Trivy, Checkmarx, and Bitwarden, plus over 150 open-source packages. The Daemon Tools attack demonstrates how widely-deployed utility software creates attractive espionage vectors for nation-state actors.

The monthlong persistence window means many compromised systems may still be active. Kaspersky's visibility comes only from their own product telemetry, suggesting the true scope could be significantly larger.

Immediate detection and monitoring steps

Organizations running Daemon Tools should immediately scan all systems with updated antivirus software and check for the indicators of compromise listed in Kaspersky's technical report. Windows environments require particular attention to code injections into legitimate system processes.

For advanced monitoring, Kaspersky recommends watching for suspicious code injections into system processes, especially when source executables launch from publicly accessible directories like Temp, AppData, or Public folders. The QUIC RAT backdoor's process injection capabilities make behavioral monitoring more effective than signature-based detection.

The attack's targeting methodology suggests ongoing reconnaissance operations. Organizations in affected geographic regions should assume persistent threat presence and implement continuous monitoring for the identified attack patterns.

#Enterprise AI#Developer Tools#AI Ethics
Share:
Keep reading

Related stories