DAEMON Tools Supply Chain Attack Confirmed, Malware-Free Version Released

DAEMON Tools Supply Chain Attack Confirmed, Malware-Free Version Released

Disc Soft Limited, the developer behind DAEMON Tools Lite, has confirmed that its software was compromised in a supply chain attack. BleepingComputer reports that the software was trojanized, indicating malicious code was injected into legitimate distribution channels, affecting users who downloaded specific versions.

The company has since released an updated, malware-free version of DAEMON Tools Lite. This incident underscores the persistent threat of supply chain attacks, where attackers target software vendors to distribute malware through trusted channels, bypassing traditional perimeter defenses and directly impacting end-users.

For defenders, this means vigilance against even widely trusted software. Attackers understand that organizations have robust perimeter defenses, so they pivot to compromise the software itself. This attack vector is highly effective, as the malicious payload comes signed and from a legitimate source, often evading detection.

What This Means For You

  • If your organization uses DAEMON Tools Lite, assume compromise. Immediately verify the version installed across all endpoints and update to the latest, malware-free release. Audit systems that ran the affected versions for any suspicious activity or persistence mechanisms.

๐Ÿ›ก๏ธ Detection Rules

3 rules ยท 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free โ€” export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

Supply Chain Compromise - DAEMON Tools Lite Download

Sigma YAML โ€” free preview

Source: Shimi's Cyber World ยท License & reuse

โœ“ Sigma ยท Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM โ†’
Take action on this incident
๐Ÿ“ก Monitor daemon-tools.cc Free ยท 1 watchlist slot ยท instant alerts on new breaches ๐Ÿ” Threat intel on Disc Soft Limited All breaches, IOCs & vendor exposure

Related coverage on Disc Soft Limited

Ransomware Attacks Succeed by Destroying Backups First, Not Just Encrypting

Ransomware operations are evolving beyond simple data encryption. BleepingComputer reports that attackers now systematically target and destroy backup systems *before* deploying their ransomware payloads. This...

threat-inteldata-breachmalwareransomwarebleepingcomputer
/SCW Research /MEDIUM

MuddyWater Uses Chaos Ransomware as Decoy for Microsoft Teams Attacks

Iranian threat group MuddyWater is employing Chaos ransomware as a deceptive tactic in their latest campaigns, according to BleepingComputer. The group leverages social engineering via...

threat-inteldata-breachmalwareransomwaremicrosoftphishing
/SCW Research /MEDIUM /⚙ 3 Sigma

CloudZ RAT and Pheno Plugin Target Windows Phone Link for Credential Theft

The Hacker News reports on a new threat leveraging the CloudZ remote access tool (RAT) alongside an undocumented plugin named Pheno. This combination is designed...

threat-intelvulnerabilitycloudmicrosoftidentitytools
/SCW Vulnerability Desk /MEDIUM /⚙ 3 Sigma