Table of Contents
Key Takeaways
- Kaspersky says DAEMON Tools installers from versions 12.5.0.2421 through 12.5.0.2434 were trojanized starting April 8, 2026.
- The attack matters because the compromised files were distributed from the legitimate DAEMON Tools site and signed by the vendor, making normal trust checks less obvious.
- If you installed or updated DAEMON Tools recently, treat it as a supply-chain incident: isolate, inventory, scan, and reinstall only from a clean verified source after the vendor fixes the channel.
Daemon Tools backdoor reports should not be treated like normal malware news. Kaspersky’s Securelist research says attackers trojanized signed DAEMON Tools installers and used them as a supply-chain path into Windows machines. That means a user could have downloaded the software from the legitimate website and still received a compromised installer.
The practical Hubkub angle is simple: this is not a reason to panic-delete every disk utility, but it is a reason to check recent DAEMON Tools installations carefully. The safest response is to identify affected versions, look for the modified binaries, scan with updated endpoint protection, and avoid reinstalling from the same channel until the incident is clearly resolved.
What happened in the DAEMON Tools supply-chain attack?
Kaspersky reported that installers for DAEMON Tools, a Windows utility used to mount disk images, were compromised with malicious payloads. The company said the affected installers were distributed from the legitimate DAEMON Tools website and digitally signed with certificates belonging to the DAEMON Tools developers. That is the key supply-chain risk: the download path and signature can look normal while the package is already poisoned.
According to Kaspersky, the compromised versions ran from 12.5.0.2421 to 12.5.0.2434, with trojanization starting on April 8, 2026. The company also said it observed several thousand infection attempts across more than 100 countries and territories, while later-stage payload deployment appeared more selective and reached about a dozen machines in sectors such as retail, science, government, and manufacturing.
| Check | Why it matters | What to do now |
|---|---|---|
| DAEMON Tools version | Kaspersky names versions 12.5.0.2421 to 12.5.0.2434 as compromised. | Inventory endpoints and flag these versions for immediate review. |
| Install date | The reported compromise started April 8, 2026. | Prioritize machines installed or updated after that date. |
| Signed binaries | The malicious files may still be vendor-signed. | Do not rely only on “valid signature” as proof of safety. |
| Network activity | The backdoor used outbound requests to a typosquatting domain. | Review proxy, DNS, EDR, and firewall logs for suspicious callbacks. |
Which Windows users should check first?
Start with Windows PCs where DAEMON Tools was installed or updated recently, especially machines used by admins, developers, finance teams, engineering teams, or anyone who handles sensitive files. DAEMON Tools is often installed on personal systems, but Kaspersky’s note that additional payloads reached organizations makes this more important for IT teams than a normal consumer-app warning.
For home users, the main question is whether DAEMON Tools was downloaded or updated after April 8, 2026. If yes, uninstalling is not enough by itself. A backdoor can drop later-stage payloads, so users should scan the machine, review startup items, and change passwords from a clean device if there are signs of compromise.
For IT teams, the first response should be an inventory query: installed product name, version, install path, install date, and any endpoint alerts involving DAEMON Tools binaries. If your organization uses software allowlisting, remember that a signed malicious binary can still pass weak allow rules. This is why supply-chain attacks are harder than normal fake-download campaigns.
What should you check on an affected machine?
Kaspersky named compromised DAEMON Tools binaries including DiscSoftBusServiceLite.exe in the DAEMON Tools install directory. A typical path may be under C:\Program Files\DAEMON Tools Lite. The important point is not only the filename; it is whether the file belongs to a vulnerable installer version and whether it triggered suspicious startup or network activity.
- Record the installed DAEMON Tools version before uninstalling.
- Check whether the machine installed or updated DAEMON Tools after April 8, 2026.
- Run an updated malware scan or EDR sweep before reconnecting the endpoint to sensitive networks.
- Review DNS/proxy/firewall logs for suspicious outbound requests around DAEMON Tools startup time.
- Rotate passwords only from a separate clean device if signs of compromise appear.
If this is a company endpoint, isolate first and collect evidence before wiping. A fast reinstall can destroy useful forensic logs. If this is a personal PC and you do not have EDR tools, use updated reputable antivirus scanning, remove the affected app, and avoid restoring unknown executables from backups made during the suspected exposure window.
How should Hubkub readers reduce this risk next time?
The DAEMON Tools incident is a reminder that “download from the official website” is necessary but not always sufficient. Official-source downloading reduces fake-site risk, but it cannot fully eliminate vendor-side compromise, poisoned build pipelines, or stolen signing workflows. For tools that run at startup, mount disk images, touch drivers, or install services, users should apply a stricter trust model.
A safer workflow is to prefer tools with transparent release notes, reproducible checks where available, clear vendor advisories, and fast incident communication. For admin and developer machines, keep a lightweight software inventory and avoid installing utilities that are not needed for daily work. If you only need to extract ISO files occasionally, a built-in Windows feature or a well-maintained open-source alternative may be safer than leaving a privileged utility installed permanently.
For broader security hygiene, read Hubkub’s Cybersecurity Guide, the GitHub Push RCE patch checklist, and the safe software downloads hub. Those pages explain the same principle from different angles: good security is not one tool, it is a repeatable verification habit.
What is confirmed and what remains unclear?
Confirmed from Kaspersky’s public report: the company identified trojanized DAEMON Tools installers, listed a vulnerable version range, said the attack started in early April 2026, and described a backdoor path that could execute shell commands and download later payloads. TechCrunch and Ars Technica both independently covered the report and emphasized that the attack used legitimate-looking signed software.
What remains unclear is the full attacker attribution, the final scope of successful compromises, and the exact remediation status of every DAEMON Tools distribution channel. Until the vendor and security researchers give a clean all-clear, the cautious position is to treat recent installs as suspect and use fresh detection data rather than assumptions.
FAQ
Q: Is every DAEMON Tools version infected?
A: Kaspersky specifically named versions 12.5.0.2421 through 12.5.0.2434 as compromised. If you use another version, still check the vendor’s latest advisory and scan the machine if you installed or updated during the reported incident window.
Q: Does a valid digital signature mean the installer is safe?
A: Not always. In this case, Kaspersky said the compromised files were digitally signed by the DAEMON Tools developer. A valid signature can confirm origin, but it cannot prove the vendor’s build or distribution chain was not compromised.
Q: Should I just uninstall DAEMON Tools?
A: Uninstalling may remove the visible app, but it does not prove the machine was never backdoored. First record the version and install date, then scan for malware, review startup/network activity, and isolate the system if you see suspicious signs.
Q: What is the safest immediate action for companies?
A: Inventory all endpoints with DAEMON Tools, prioritize affected versions, isolate suspicious machines, review network logs, and run updated EDR detections. Do not weaken software-signing policies, but add behavior and source-chain checks around privileged utilities.
Sources: Kaspersky Securelist report, TechCrunch coverage, and Ars Technica coverage.







