Kaspersky Alerts on Backdoor in Daemon Tools in Massive Attack

Summary: Kaspersky has detected a malicious backdoor in Daemon Tools, a popular disk image software, targeting thousands of Windows computers in a massive attack.

Suspected Cyber-Espionage: A Hidden Backdoor in Daemon Tools Targets Chinese Hackers

A new investigation in the field of cybersecurity has sounded global alarms. According to TechCrunch, the company Kaspersky has detected indications that a hacker group linked to China introduced a backdoor into the popular Daemon Tools software, used by millions of users worldwide.

Legitimate Software Turned into an Attack Vector

Daemon Tools is widely known for allowing the creation and mounting of disk images. However, in this case, compromised versions of the program were allegedly used as a vehicle to silently distribute malware.

This type of attack is known as a supply chain attack, where attackers compromise legitimate software to infect users without raising suspicion.

The Role of the Backdoor: Covert and Persistent Access

The detected backdoor would allow attackers to:

  • Execute remote code on infected devices
  • Access sensitive information
  • Install additional malware
  • Maintain persistence without being detected

Most concerning is that this access could remain active for long periods, facilitating digital espionage operations.

Attribution: Indications Pointing to China

According to Kaspersky's analysis, there are technical patterns and tactics that match previously attributed campaigns to Advanced Persistent Threat (APT) groups linked to China.

Although attribution in cybersecurity is never absolute, researchers highlight similarities in:

  • Command and control (C2) infrastructure
  • Obfuscation methods
  • Tools used in previous campaigns
Attack Scope: A Wide and Silent Campaign

The attack would have affected multiple users globally, suggesting a carefully planned and executed operation.

Unlike noisy attacks such as ransomware, this type of intrusion seeks to go unnoticed, focusing on long-term information collection.

Potential targets include:

  • Technology companies
  • Government organizations
  • Researchers and developers
  • Users with access to sensitive systems
Why This Attack is Especially Dangerous

This incident highlights several critical factors:

  • Compromised Trust: Legitimate software ceases to be safe
  • Difficult Detection: Malware is hidden within trusted applications
  • Mass Distribution: Exploits official download channels
  • Advanced Persistence: Access can be maintained for months

In security terms, this type of attack is more sophisticated than traditional infections.

Recommendations for Users and Organizations

Faced with this scenario, experts recommend:

  • Downloading software only from verified official sources
  • Verifying application digital signatures
  • Keeping systems and antivirus updated
  • Monitoring suspicious outbound connections
  • Implementing Endpoint Detection & Response (EDR) solutions

For businesses, additionally:

  • Auditing third-party software
  • Applying Zero Trust policies
  • Segmenting internal networks
A Warning Sign for the Tech Industry

The Daemon Tools case reinforces a worrying trend: attackers are shifting their focus toward the software supply chain.

This forces a rethinking of traditional security models and requires strengthening controls at every stage of software development and distribution.

Trust, one of the pillars of the digital ecosystem, thus becomes the primary target of modern cyberattacks.

Key facts

  • Malware detected in Daemon Tools.
  • The attack is labeled 'widespread' and 'targeted'.
  • Suspects were linked to a Chinese-speaking group.
  • The attack involves the software supply chain.

Why it matters

This incident highlights the growing danger of supply chain attacks, where compromising one software developer can endanger thousands of users. Companies must reinforce vigilance in their essential tools to mitigate risks of malware and backdoors.