Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack

    May 6, 2026

    All Life Uses 20 Amino Acids. Scientists Just Deleted One in Bacteria.

    May 6, 2026

    Onyx Boox Palma 2 Pro review: the pocket-sized ereader now has color, stylus support and mobile data

    May 6, 2026
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Cybersecurity»Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack
    Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack
    Cybersecurity

    Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack

    The Tech GuyBy The Tech GuyMay 6, 2026No Comments2 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement


    Government, scientific, manufacturing, and retail organizations have been targeted with a sophisticated backdoor in an ongoing supply chain attack involving the Daemon Tools disk imaging software, Kaspersky reports.

    Advertisement

    As part of the attack, Chinese-speaking attackers apparently injected malicious code into multiple Daemon Tools iterations that have been available for download via the software’s legitimate website.

    Daemon Tools versions 12.5.0.2421 to 12.5.0.2434, released since April 8, have been found to contain injected code, and the attack remains active, Kaspersky says. AVB Disc Soft, the company behind Daemon Tools, has been notified.

    As part of the supply chain attack, the threat actors compromised three binaries within the software, namely DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe, all signed using certificates belonging to AVB Disc Soft.

    “Whenever one of these binaries is launched, which happens at the machine startup, a backdoor gets activated. This backdoor is implanted in the startup code responsible for initializing the CRT environment,” Kaspersky explains.

    The backdoor was observed sending requests to a typosquatting domain registered on March 27. The server responds with a shell command executed via command prompt to fetch and run a payload.

    Advertisement. Scroll to continue reading.

    The attackers relied on this mechanism to attempt to deploy an information collector on thousands of machines across over 100 countries, mainly in Brazil, China, France, Germany, Italy, Russia, Spain, and Turkey. Roughly 10% of the affected machines belong to various businesses and organizations.

    Using the information collected by the malware, the attackers identified systems of interest and infected them with a second, minimalistic backdoor.

    Only a dozen systems at government, scientific, manufacturing, and retail organizations in Belarus, Russia, and Thailand were infected with the backdoor, suggesting a targeted attack, Kaspersky says.

    Furthermore, the backdoor was used to deploy more complex malware, namely the QUIC RAT, against a single educational institution in Russia.

    “This manner of deploying the backdoor to a small subset of infected machines clearly indicates that the attacker had intentions to conduct the infection in a targeted manner. However, their intent – whether it is cyberespionage or ‘big game hunting’ – is currently unclear,” Kaspersky notes.

    Related: 1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

    Related: SAP NPM Packages Targeted in Supply Chain Attack

    Related: Are SBOMs Failing? Supply Chain Attacks Rise as Security Teams Struggle With SBOM Data

    Related: Axios NPM Package Breached in North Korean Supply Chain Attack

    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    Critical Bug Could Expose 300,000 Ollama Deployments to Information Theft

    May 6, 2026

    Hacker Conversations: Joey Melo on Hacking AI

    May 5, 2026

    Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations

    May 5, 2026

    MetInfo, Weaver E-cology Vulnerabilities in Attackers’ Crosshairs

    May 5, 2026

    Trellix Source Code Repository Breached

    May 5, 2026

    Cisco Moves to Acquire Astrix Security to Tackle Non-Human Identity Risks

    May 4, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    ChatGPT Group Chats are here … but not for everyone (yet)

    November 14, 20258 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack

    May 6, 2026

    All Life Uses 20 Amino Acids. Scientists Just Deleted One in Bacteria.

    May 6, 2026

    Onyx Boox Palma 2 Pro review: the pocket-sized ereader now has color, stylus support and mobile data

    May 6, 2026
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.