Daemon Tools app hit by monthlong supply-chain attack

Daemon Tools, a popular disk image mounting app, was compromised in a supply-chain attack starting April 8, delivering malware through official updates. Security firm Kaspersky reported infections on thousands of machines across over 100 countries. Users are urged to scan their systems immediately.

Kaspersky disclosed on May 5 that the attack on Daemon Tools began on April 8 and continued for about a month. Malicious installers, signed with the developer's official digital certificate, were distributed from the AVB developer's website. Affected Windows versions range from 12.5.0.2421 to 12.5.0.2434, with the malware activating at boot to collect data like MAC addresses, hostnames, and installed software before sending it to attacker-controlled servers. Thousands of machines were hit, primarily in Russia, Brazil, Turkey, Spain, Germany, France, Italy, and China, Kaspersky said based on its telemetry. About 10% belonged to businesses and organizations, including retail, scientific, government, and manufacturing sectors. Only around 12 systems received advanced backdoors, such as a minimalistic one enabling command execution and file downloads, or the more sophisticated QUIC RAT spotted on one Russian educational machine. “Based on our long-term experience of analyzing supply chain attacks, we can conclude that attackers orchestrated the DAEMON Tools compromise in a highly sophisticated manner,” Kaspersky researchers wrote. They noted similarities to past incidents like the 2023 3CX attack, which also took about a month to detect. Kaspersky advised users to scan machines with antivirus software and check for indicators of compromise listed in its report, especially suspicious code injections into processes like notepad.exe from directories such as Temp or AppData. Neither Kaspersky nor developer AVB provided further immediate details.

Relaterte artikler

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Bilde generert av AI

Linux CopyFail exploit threatens root access amid Ubuntu outage

Rapportert av AI Bilde generert av AI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Developers of the gacha RPG Duet Night Abyss have apologized for a cybersecurity incident that distributed malware to players' PCs via a launcher update on March 18. The malware, identified as Trojan:MSIL/UmbralStealer.DG!MTB, targets passwords and cryptocurrency. Players receive in-game compensation as the team implements security enhancements.

Rapportert av AI

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

A security vulnerability in Dell software has reportedly remained unpatched for almost two years, allowing Chinese hackers to exploit it. The flaw involves hardcoded login credentials in a tool, raising concerns about data security.

Rapportert av AI

Infostealer malware has targeted OpenClaw AI agents for the first time, according to a TechRadar report. The incident highlights vulnerabilities in locally deployed AI systems that store sensitive information. The article was published on February 17, 2026.

A hacking technique called DarkSword, used by Russian hackers, can compromise iPhones running iOS 18 simply by visiting infected websites. Discovered in the wild, this tool has been deployed in espionage and cybercriminal campaigns to target thousands of devices indiscriminately. It is now available online in a reusable form, risking a large portion of iPhone users worldwide.

Rapportert av AI

A scam campaign called CallPhantom has appeared in 28 applications available on the Google Play store. The apps, which have been downloaded more than 7 million times combined, promised users access to their call logs.

Dette nettstedet bruker informasjonskapsler

Vi bruker informasjonskapsler for analyse for å forbedre nettstedet vårt. Les vår personvernerklæring for mer informasjon.
Avvis