Kaspersky GReAT
disclosed today that the official installers for DAEMON
Tools, a widely used Windows disk-image-mounting
utility published by AVB Disc Soft, have been distributing
malware since April 8, 2026, signed with the
legitimate AVB Disc Soft Authenticode certificate and served
directly from the vendor's primary domain. Kaspersky identified
versions 12.5.0.2421 through the
then-current 12.5.0.2434 as compromised, with three
binaries inside each install (DTHelper.exe,
DiscSoftBusServiceLite.exe,
DTShellHlp.exe) modified to launch a backdoor at
every machine startup. The campaign affected
thousands of machines across more than 100
countries, with about 10% of infections in business or
organizational environments. Kaspersky compares the
sophistication and undetected duration to the 2023 3CX
supply-chain attack, and flags Chinese-language artifacts in
the implants while declining to attribute the campaign to a
specific actor. Kaspersky has notified AVB Disc Soft. The
campaign is reported as still active at time of
Kaspersky's writeup (May 5).
Framing note: this is not a vulnerability in DAEMON Tools as software; it is a compromise of the vendor's official binary distribution and code-signing trust chain. There is no CVE. The response is detection, host triage, and reimaging where warranted, not patching. AVB Disc Soft has not, at time of writing, issued a public advisory, named a clean-version cutoff, or announced a signing-cert rotation.
The compromised installers are signed with a valid
AVB Disc Soft developer certificate, which means
EDR allowlists and software-reputation services that auto-
trust signed binaries from this publisher provided no
defense. Disk-emulation software is granted elevated
privileges at install (it needs kernel-level filesystem
hooks to function), so the implant runs with deep system
access from first boot after install. The startup-time
backdoor beacons to a typosquatted C2
(env-check.daemontools[.]cc, mimicking the
legitimate daemon-tools[.]cc); for the
overwhelming majority of observed infections the next-stage
payload is an info-stealer, but for ~12 specifically-
targeted machines in government,
scientific, manufacturing, and retail sectors in Russia,
Belarus, and Thailand, attackers deployed a more capable
in-memory backdoor and, in one case, a multi-protocol RAT
Kaspersky has dubbed QUIC RAT. Treat any
Windows host that installed an affected DAEMON Tools build
on or after April 8, 2026 as compromised until proven
otherwise.
env-check.daemontools[.]cc and
38.180.107[.]76 at the egress proxy or DNS
sinkhole. The legitimate vendor domain is
daemon-tools[.]cc; the malicious one inserts
no hyphen — easy to miss in a log review.
Priorities, by environment
How to triage this depends on whether DAEMON Tools is in your environment at all, who installed it, and what that host could reach. The compromise is not a transitive dependency problem like the npm/PyPI campaigns of April; the affected population is "people who deliberately downloaded DAEMON Tools from the official vendor site between April 8 and now."
| Priority | Workload | Why |
|---|---|---|
| Highest | Hosts in Russia, Belarus, or Thailand in gov / scientific / manufacturing / retail / education | These sectors and geographies are where Kaspersky observed second-stage backdoor and QUIC RAT deployments. If DAEMON Tools is installed on any host fitting this profile, treat it as targeted-attack priority and engage IR. |
| Higher | Corporate / managed environments where DAEMON Tools is in standard imaging or on shared workstations | Disk-emulation tools sometimes ship with QA, forensics, or media-handling images. A compromised installer in a base image fans out to every host built from it. Audit your imaging pipeline for DAEMON Tools presence and rebuild any image that included an affected version. |
| Higher | Developer or analyst workstations with credentials reaching cloud, source-control, or production | The first-stage info-stealer enumerates running processes, installed software, and locale to fingerprint the host. Even on hosts that received only the stealer, the attacker now has a profile useful for selecting future targets. If the host had cloud / Git / VPN credentials in scope, rotate them. |
| Medium | Individual developer / power-user workstations (no production credentials) | Most observed infections fall here. Uninstall, run a full EDR scan, hunt for the IOC artifacts, and rotate any credentials cached on the host. Reimage if the machine handled anything sensitive. |
| Medium | Home users who installed during the window | Uninstall, scan with a current AV that has signatures for this campaign (Kaspersky is the obvious choice given they wrote the IOCs; Microsoft Defender, Sophos, and others should pick it up promptly), rotate browser-saved credentials and any tokens used on the machine. |
| Lower | No DAEMON Tools, or installed before April 8 / after release of a clean version | Verify by checking the install directory for the named binaries. If DAEMON Tools was installed before April 8, 2026 and never updated during the window, you are not affected. There is no clean version published yet, so "after a clean version" is not yet an applicable criterion. |
Categorization source: Bulletin's framing based on Kaspersky's victimology breakdown. Targeting bands reflect Kaspersky's reported sector / geography distribution of stage-two payloads, not a Kaspersky-issued priority schema.
Am I affected?
Every trojanized binary in this campaign passes Authenticode
verification with a legitimate AVB Disc Soft signature. Do
not rely on signature-status checks, "publisher verified"
in Windows, or EDR signed-binary allowlists to clear a host.
Published IOC hash matches are high-confidence
positive indicators of compromise. A non-match,
though, does not clear the host: Kaspersky enumerated SHA-1s
for the installers and for nine
DiscSoftBusServiceLite.exe samples, but did not
publish full per-version SHA-1s for every
DTHelper.exe and DTShellHlp.exe
variant. If the version is in the affected range and the
install or update happened on or after April 8, treat the
host as suspect and triage on multiple signals: file
timestamps and file-version metadata, dropped artifact
presence, beacon traffic in historical DNS / proxy / EDR
logs, and a known-clean baseline if you have one.
Quick checks (Windows, PowerShell, run as admin)
Is DAEMON Tools installed at all? Check both 64-bit and WOW6432Node uninstall hives, since the registered uninstall entry can land in either depending on installer type:
$uninstall = @(
"HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*",
"HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*"
)
Get-ItemProperty $uninstall -ErrorAction SilentlyContinue |
Where-Object { $_.DisplayName -like "*DAEMON Tools*" } |
Select-Object DisplayName, DisplayVersion, InstallDate, InstallLocation
InstallDate can be missing, stale, or formatted
inconsistently across installers, so don't rely on it alone.
Use file timestamps and embedded version metadata as well:
$paths = @(
"C:\Program Files\DAEMON Tools Lite\DTHelper.exe",
"C:\Program Files\DAEMON Tools Lite\DiscSoftBusServiceLite.exe",
"C:\Program Files\DAEMON Tools Lite\DTShellHlp.exe"
)
Get-Item $paths -ErrorAction SilentlyContinue |
Select-Object FullName, CreationTime, LastWriteTime,
@{n="ProductVersion"; e={$_.VersionInfo.ProductVersion}},
@{n="FileVersion"; e={$_.VersionInfo.FileVersion}}
Get-Item $paths -ErrorAction SilentlyContinue |
Get-FileHash -Algorithm SHA1
Compare the installer hash (if you still have
the installer) and the DiscSoftBusServiceLite.exe
SHA-1 against Kaspersky's published IOCs — these are the two
classes for which Kaspersky enumerated multiple known-bad
hashes. For DTHelper.exe and
DTShellHlp.exe, Kaspersky does not appear to have
published full per-version SHA-1 coverage in the public IOC
list, so a non-match for those two binaries is not by itself
sufficient to clear the host. A known-clean pre-April-8 baseline
from your golden image, an unaffected machine in the same fleet,
or a clean snapshot is the more reliable comparison for those
files. If the version is in the affected range and the install
or update happened on or after April 8, treat the host as
suspect regardless of the per-binary hash result.
Beacon artifacts — historical first. Live
lookups should not be your first move; they can interact with
attacker infrastructure or sinkholes and they tell you nothing
about whether the host beaconed earlier. Check, in this order:
DNS server logs, proxy logs, firewall logs, EDR network
telemetry, and SIEM for connections to
env-check.daemontools[.]cc or
38.180.107[.]76 at any point on or after April 8.
Then, on the host itself, inspect the local DNS resolver cache:
Get-DnsClientCache |
Where-Object { $_.Entry -like "*daemontools.cc*" -or $_.Name -like "*daemontools.cc*" }
Get-NetTCPConnection -State Established |
Where-Object { $_.RemoteAddress -eq "38.180.107.76" }
An empty result is not exonerating — the cache only shows recent entries and the active-connection list is a snapshot. Historical telemetry from your network and EDR stack is the authoritative signal.
Dropped-payload presence:
Get-ChildItem ` "C:\Windows\Temp\envchk.exe", ` "C:\Windows\Temp\cdg.exe", ` "C:\Windows\Temp\imp.tmp", ` "C:\Windows\Temp\piyu.exe", ` "C:\Windows\Temp\crypto.dll", ` "C:\ProgramData\Microsoft\mcrypto.chiper", ` "$env:APPDATA\Microsoft\mcrypto.dat" ` -ErrorAction SilentlyContinue
Any hit here is high-confidence compromise, not just
"exposed installer." Note that the loader cleans up after
itself in observed command sequences (del %TEMP%\cdg.exe
and similar), so live filesystem absence does not rule out
historical execution — pivot to EDR process telemetry and
command-line logging if you have it.
Response, if a host installed an affected version on or after April 8
-
Isolate the host. Pull it off the network or
restrict outbound traffic to your forensic-collection path
only. Do not uninstall yet — uninstalling DAEMON Tools may
wipe artifacts you want for triage. If you are not running
formal IR, snapshot the affected files first
(
DTHelper.exe,DiscSoftBusServiceLite.exe,DTShellHlp.exe, plus any matches from the dropped-payload check) to a separate location for hash and scanner verification. -
Identify the scope of credential exposure.
For the overwhelming majority of observed infections the
first-stage payload is the
info-stealer (
envchk.exe), which collects process list, software list, hostname, MAC, DNS domain, and locale — not credentials directly. But the host has been running attacker code with elevated privileges since first boot after install. Treat as exposed: any credential cached in browsers, cloud-CLI configs (%USERPROFILE%\.aws,.azure,.config\gcloud,.kube), SSH keys (%USERPROFILE%\.ssh), VPN client profiles, Git credential manager, password manager auto-unlock state, and any tokens in%APPDATA%for tools the user runs. Rotate them. - Run a full EDR / AV scan with current signatures. Kaspersky's products detect this campaign by name; Microsoft Defender, Sophos, and other major vendors should pick it up within hours of the public Securelist post if not already. For organizations: feed the SHA-1 hashes from the IOC block into your EDR's custom-IOC mechanism so detection does not wait on the vendor's own signature ship cycle.
-
Hunt for the second-stage backdoor and QUIC RAT.
Even on hosts where the first-stage info-stealer was the
observed payload, check for second-stage artifacts:
presence of
cdg.exe/piyu.exein%TEMP%, presence ofmcrypto.chiper/mcrypto.datunderProgramData\MicrosoftorAPPDATA\Microsoft,rundll32invocations against unusual DLLs (especially ones withmcrypto_cleanas the export), and process injection intonotepad.exeorconhost.exe(the QUIC RAT's documented injection targets). Hunt your EDR telemetry, not just live state — the loader cleans up after itself (del %TEMP%\cdg.exeetc. are present in the observed command sequences). -
Block the campaign infrastructure. At your
egress proxy, DNS resolver, or firewall:
env-check.daemontools[.]ccand38.180.107[.]76. The legitimate vendor domain isdaemon-tools[.]cc— note the typosquat is without the hyphen, the legitimate one has it. Allowlist by string match risks blocking the wrong one. -
Uninstall DAEMON Tools and clean residual drivers.
After artifact preservation, uninstall via
Apps & Features. DAEMON Tools installs low-level
virtual-drive drivers that Windows may retain after
uninstall — clean them up via
sc query type= driverfor Disc Soft service names andsc deleteany that remain. Reboot. Do not reinstall DAEMON Tools (or any AVB Disc Soft / Disc Soft Ltd. product) until the vendor publishes a clean build, explains the remediation, and clarifies the status of its build pipeline and signing certificate. If the workflow that relied on DAEMON Tools cannot wait, evaluate alternatives (Windows native ISO mounting viaMount-DiskImageon Windows 8+, OSFMount, WinCDEmu) for the interim. - Reimage where the host's role warrants it. For any host that handled corporate credentials, source control, production access, or sensitive data: wipe and rebuild from known-clean media. Targeted second-stage payloads, including the QUIC RAT, are not fully enumerated in public reporting yet — Kaspersky's analysis is ongoing. Don't try to clean piecewise on a host whose role makes residual compromise expensive.
- Audit your software-acquisition policy. DAEMON Tools is a useful prompt to ask: which "signed by a known vendor" desktop tools are in your environment that are not centrally managed? Disk-image emulators, screen-capture tools, ISO writers, USB-creation utilities, download managers, and similar utilities frequently arrive on workstations via individual user installs from vendor sites. They run with administrative privileges, are usually excluded from EDR allowlists (because they're signed by their publisher), and rarely appear in centrally tracked software inventory. This compromise pattern works against any of them.
- Document the rotation and timeline. Standard incident hygiene: record which credentials were rotated, which hosts were reimaged, and when. Given the targeted second-stage activity (gov / sci / manufacturing / retail in specific geographies), additional Kaspersky or partner reporting may surface in the coming weeks; you want the timeline reconstructable.
Whatever the access path was that let attackers inject into the AVB Disc Soft build pipeline (Kaspersky has not published the initial-access vector), the lesson generalizes to anyone shipping signed Windows software: signing is integrity-of-publisher, not integrity-of-build. Build-system compromise produces signed malware. Worth checking the usual list — separation between developer workstations and signing infrastructure, hardware-bound signing keys, reproducible-build verification before signing, and an out-of-band channel where users can verify a published binary's hash against the vendor's record. None of these prevent an attacker who has fully compromised the build host, but they raise the bar above "any developer-workstation compromise becomes a supply-chain compromise."
The broader pattern
A few observations worth flagging in the context of this Bulletin's recent series:
First, this is the second model of supply-chain compromise in the same window as the npm / PyPI campaigns ("Mini Shai-Hulud" and the Bitwarden CLI / xinference / Lightning / Lovable / Vercel / Checkmarx run). The npm/PyPI campaigns hijacked package-registry distribution; this one hijacked vendor-direct binary distribution. The defense surface is different: package-pinning, lockfile hygiene, and registry-side malware scanning don't apply here. EDR allowlists and Authenticode trust did apply — and were circumvented by signing the malware with the legitimate publisher cert.
Second, Kaspersky's "fourth supply-chain attack of 2026" framing (eScan in January, Notepad++ in February, CPU-Z in April, DAEMON Tools in May) is a real acceleration. The targeting overlap between this campaign and the others is unclear, but the operational tempo is what operators should plan against: at least one publicly disclosed vendor-distribution compromise per month, none of them detectable by package-registry hygiene.
Third, the two-stage targeting — wide info- stealer net, narrow second-stage backdoor on selected hosts — is a tradecraft pattern operators should recognize. Most affected machines see only fingerprinting; targeted second- stage activity is reserved for hosts that look interesting after the profile comes back. If your environment does not look like an obvious target geography or sector, you may be in the broad group regardless of how interesting your data is to the right adversary. "We didn't see a backdoor get deployed" is not the same as "we weren't compromised."
If any Windows host in your environment installed DAEMON
Tools 12.5.0.2421 – 12.5.0.2434 on or after April 8, 2026:
isolate it, hash-check the three named binaries against
Kaspersky's IOC list, scan for the dropped payloads
(envchk.exe, cdg.exe,
piyu.exe, mcrypto.chiper,
mcrypto.dat), block
env-check.daemontools[.]cc and
38.180.107[.]76, rotate every credential the
host could reach, uninstall and reboot, and reimage if the
host's role warrants it. Do not reinstall DAEMON Tools (or
anything else from AVB Disc Soft / Disc Soft Ltd.) until
the vendor publishes a clean build with an explanation of
what was remediated and a clear statement on the status of
the build pipeline and signing certificate. The
Authenticode signature on the malware is
valid; do not let signed-binary trust short-circuit your
triage.