Technology

DAEMON Tools trojan supply-chain backdoor

Misryoum reports DAEMON Tools installers were trojanized to deliver a backdoor, affecting many systems and indicating targeted follow-up payloads.

A supply-chain compromise tied to DAEMON Tools is a sharp reminder that “legitimate” software can become the delivery vehicle for real-world backdoors.

According to Misryoum. trojanized DAEMON Tools installers distributed via the official download route were used to deploy malicious code to thousands of systems.. The activity began on April 8 and. while the initial infections were broad across more than 100 countries. the follow-on payloads appear to have been reserved for a much smaller set of machines.

That design stands out: many systems can be used to cast a wide net, but only certain targets receive the next stage. Misryoum notes that second-stage delivery was observed on roughly a dozen devices, pointing to a more selective objective after the attackers profiled potential victims.

Misryoum adds that the trojanized packages involved specific DAEMON Tools versions, spanning builds from 12.5.0.2421 through 12.5.0.2434.. The compromised components included binaries such as DTHelper.exe. DiscSoftBusServiceLite.exe. and DTShellHlp.exe. which were weaponized once users downloaded and ran the digitally signed installers.

For those who executed the installers. the malware established persistence so it could run at system startup and activate a backdoor.. From there. the compromised system could receive instructions from an attacker-controlled server to download and execute additional payloads. effectively turning the infected PC into a platform for further actions.

Before the backdoor phase. Misryoum says the first-stage code functioned as an information stealer. gathering system identifiers and environment details like hostname. network interface information. running processes. installed software. and system locale.. Those details are often used to prioritize victims and tailor later stages. which helps explain why not every infected device received the same level of follow-up.

In at least one case involving an educational organization. Misryoum reports that a more advanced malware strain was observed. including capabilities like code injection into legitimate processes.. Researchers also described the compromise as sophisticated enough to avoid detection for nearly a month.

This matters because supply-chain attacks can be harder to spot with basic defenses: if the initial payload arrives under the cover of a normally trusted installer. it may bypass typical suspicion triggers.. Misryoum recommends that organizations review systems that installed DAEMON Tools around the affected timeframe and look for unusual activity that began on or after April 8. especially persistent behavior and signs of backdoor activity.

Secret Link