freecking

Daemon Tools Disk App Hijacked: 100 Countries Affected in Month-Long Supply-Chain Attack

By TechGuru • 2026-05-06T06:00:18.602437

Daemon Tools Disk App Hijacked: 100 Countries Affected in Month-Long Supply-Chain Attack
In a disturbing turn of events, Daemon Tools, a widely used application for mounting disk images, has fallen victim to a month-long supply-chain attack. According to researchers at Kaspersky, the attack began on April 8 and was still active at the time of reporting. The malicious updates, which were distributed from the developer's own servers, have compromised thousands of machines across over 100 countries.



The infected versions of Daemon Tools, which range from 12.5.0.2421 to 12.5.0.2434, contain an initial payload that collects sensitive information such as MAC addresses, hostnames, DNS domain names, running processes, installed software, and system locales. This data is then sent to an attacker-controlled server, highlighting the severity of the breach.



From a technical standpoint, the attack is particularly concerning because the installers are signed with the developer's official digital certificate, making them appear legitimate. This has allowed the malware to run at boot time, further complicating the situation. While Kaspersky did not explicitly confirm the affected platforms, analysis suggests that only Windows versions of Daemon Tools are impacted.



The implications extend beyond the immediate compromise of user data. For everyday users, this could mean a significant increase in the risk of further malware infections or even ransomware attacks. From an industry perspective, this incident serves as a stark reminder of the importance of robust security measures, particularly in the context of supply-chain attacks.



As the situation continues to unfold, it is crucial for users to exercise caution and vigilance. Given the scale and scope of the attack, it is likely that the consequences will be far-reaching, affecting not only individual users but also organizations across various sectors. The fact that about 12 machines, belonging to retail, scientific, government, and manufacturing organizations, have received a follow-on payload, suggests that the attackers may be targeting specific groups, potentially for more sophisticated or targeted attacks.



For developers and businesses, this incident highlights the need for enhanced security protocols and rigorous testing of software updates. The fact that the attackers were able to distribute malicious updates from the developer's own servers underscores the importance of securing the software development and distribution process.



In conclusion, the Daemon Tools supply-chain attack is a sobering reminder of the evolving threat landscape and the need for constant vigilance. As users, developers, and organizations, it is essential to stay informed and adapt to emerging threats to mitigate the risks associated with such attacks.



The attack's impact on the broader market could be significant, with potential ripple effects on the cybersecurity industry as a whole. As companies and individuals reassess their security posture, the demand for more secure software development and distribution practices may increase, driving innovation and investment in this area.



Ultimately, the Daemon Tools incident serves as a wake-up call for the tech industry, emphasizing the importance of proactive security measures and collaboration to prevent and respond to such attacks. By understanding the context, significance, and consequences of this incident, we can work towards creating a more secure digital environment for all.