Kaspersky Links Suspected Chinese Hackers to Backdoor Planted in Daemon Tools Supply Chain Attack

Cybersecurity researchers at Kaspersky have uncovered a large-scale supply chain attack involving the popular Windows disk imaging software Daemon Tools, where attackers allegedly implanted a malicious backdoor into official installers distributed through the software’s legitimate website. The company believes the operation is linked to a Chinese-speaking threat actor.

According to researchers, the compromised installers have been circulating since April 8, 2026, and affect multiple versions of the software, including releases from version 12.5.0.2421 onward. The malicious installers were reportedly signed using valid digital certificates belonging to AVB Disc Soft, the developer of Daemon Tools, allowing the malware to appear authentic and bypass common security warnings.

The attack is considered particularly dangerous because Daemon Tools requires elevated system permissions to emulate virtual drives. By exploiting this trusted access, attackers were able to establish deep persistence within infected systems and deploy remote-control malware capable of executing commands and downloading additional payloads.

Kaspersky stated that telemetry data indicates thousands of infection attempts globally, with confirmed compromises affecting organizations across sectors including retail, industrial operations, scientific institutions, and government environments. Researchers said the attackers selectively deployed advanced malware on a subset of infected systems, suggesting a targeted espionage-oriented campaign rather than indiscriminate malware distribution.

The cybersecurity firm has notified AVB Disc Soft about the incident, though reports indicate the attack remained active at the time of disclosure. The company behind Daemon Tools acknowledged awareness of the report and said it was investigating the issue while working to mitigate risks for users.

The incident highlights the growing threat of software supply chain attacks, where attackers compromise trusted software distribution channels to infiltrate downstream systems at scale. Security experts warn that such attacks are becoming increasingly common as threat actors target software vendors and developer ecosystems to maximize reach and evade detection.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the report 2026

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch