<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AVB Disc Soft — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/avb-disc-soft/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 08:34:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/avb-disc-soft/feed.xml" rel="self" type="application/rss+xml"/><item><title>Daemon Tools Supply Chain Attack Targeting Government and Scientific Entities</title><link>https://feed.craftedsignal.io/briefs/2026-05-daemon-tools-supply-chain/</link><pubDate>Wed, 06 May 2026 08:34:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-daemon-tools-supply-chain/</guid><description>A supply chain attack involving trojanized Daemon Tools versions 12.5.0.2421 to 12.5.0.2434 delivered a sophisticated backdoor to a limited number of government, scientific, manufacturing, and retail organizations after a broader initial infection.</description><content:encoded><![CDATA[<p>In May 2026, Kaspersky reported a supply chain attack targeting government, scientific, manufacturing, and retail organizations through compromised versions of Daemon Tools disk imaging software. Attackers injected malicious code into Daemon Tools versions 12.5.0.2421 to 12.5.0.2434, which were available for download from the legitimate website starting April 8, 2026. Three binaries within the software—DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe—were compromised with injected code and signed with valid AVB Disc Soft certificates. This resulted in a widespread initial infection attempting to deploy an information collector across over 100 countries. After the initial infection, the attackers deployed a second, minimalistic backdoor on a dozen systems of interest in Belarus, Russia, and Thailand, and the QUIC RAT on a single educational institution in Russia.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attackers inject malicious code into legitimate Daemon Tools binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe).</li>
<li>Compromised Daemon Tools versions 12.5.0.2421 to 12.5.0.2434 are made available for download via the legitimate website.</li>
<li>Users download and install the trojanized Daemon Tools software.</li>
<li>When one of the compromised binaries is launched (at machine startup), the injected backdoor is activated.</li>
<li>The backdoor sends requests to a typosquatting domain.</li>
<li>The server responds with a shell command executed via command prompt to fetch and run a payload.</li>
<li>The attackers deploy an information collector on thousands of machines across over 100 countries.</li>
<li>Based on collected information, the attackers deploy a second, minimalistic backdoor on select systems and the QUIC RAT on others for further exploitation and data collection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The supply chain attack compromised government, scientific, manufacturing, and retail organizations. While thousands of machines were initially infected to deploy an information collector, a second backdoor was specifically deployed to a dozen systems in Belarus, Russia, and Thailand. The QUIC RAT was deployed against an educational institution in Russia. The intent of the attackers is unclear, but the targeted nature of the second-stage infections suggests cyberespionage or &ldquo;big game hunting.&rdquo;</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process executions for the compromised Daemon Tools binaries (DTHelper.exe, DiscSoftBusServiceLite.exe, and DTShellHlp.exe) using process_creation logs.</li>
<li>Implement network monitoring to detect connections to known typosquatting domains associated with the attack.</li>
<li>Deploy the Sigma rules provided below to detect malicious command line activity and modified Daemon Tools binaries.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>backdoor</category><category>daemon tools</category></item></channel></rss>