ctipilot.chSwitzerland · Europe · Public sector

DAEMON Tools supply chain compromise — China-nexus QUIC RAT via signed installers

incident · incident:daemon-tools-supply-chain-2026

Coverage timeline
1
first 2026-05-07 → last 2026-05-07
Briefs
1
1 distinct
Sources cited
8
7 hosts
Sections touched
1
incidents
Co-occurring entities
1
see Related entities below

Story timeline

  1. 2026-05-07CTI Daily Brief — 2026-05-07
    incidentsFirst coverage. Disc Soft distribution server compromised 2026-04-08 to 2026-05-05; authentic Disc Soft code-signing cert maintained; three-stage payload (info collector + shellcode backdoor + QUIC RAT); ~12 targeted victims in government, scientific, manufacturing sectors; Germany, France, Italy in victim distribution; Chinese-speaking threat actor (unattributed); vendor confirmed and patched.

Where this entity is cited

  • incidents1

Source distribution

  • kaspersky.com2 (25%)
  • helpnetsecurity.com1 (12%)
  • therecord.media1 (12%)
  • bleepingcomputer.com1 (12%)
  • malwarebytes.com1 (12%)
  • microsoft.com1 (12%)
  • securelist.com1 (12%)

Related entities

All cited sources (8)

Items in briefs about DAEMON Tools supply chain compromise — China-nexus QUIC RAT via signed installers (1)

DAEMON Tools Lite supply chain — QUIC RAT deployed via signed installer; EU governments among targeted victims

From CTI Daily Brief — 2026-05-09 · published 2026-05-10 · view item permalink →

Since 8 April 2026, trojanised versions of DAEMON Tools Lite (12.5.0.2421 through 12.5.0.2434) have been distributed from the legitimate vendor website, signed with valid AVB Disc Soft digital certificates. Kaspersky researchers documented a three-stage architecture: an initial profiling component (envchk.exe) fingerprinting the system; a minimalistic backdoor enabling remote command execution on selected targets; and QUIC RAT, an advanced implant that injects into notepad.exe and conhost.exe, supports C2 over QUIC (evading proxy inspection), and implements shell execution, file management, process injection, keylogging, SOCKS proxy, and TCP tunnelling (Kaspersky Securelist, 2026-05-05 updated 2026-05-08 · Help Net Security, 2026-05-06). Several thousand installation attempts were observed across ~100 countries; Germany, France, Spain, and Italy are among the top victim countries. Targeted QUIC RAT deployment was limited to approximately a dozen machines in government, scientific, manufacturing, and retail sectors — indicating selective activation consistent with intelligence-collection objectives. Artefacts including Chinese-language strings suggest a Chinese-speaking actor; no formal attribution has been made. The clean release is version 12.6.0.2445 (released 2026-05-06).

MITRE ATT&CK coverage: T1195.002 Supply Chain Compromise; T1036.004 Masquerade Task or Service (kworker/ksoftirqd masquerade); T1573.002 Asymmetric Cryptography / QUIC; T1055 Process Injection.

Defender takeaway: Audit endpoints for DAEMON Tools Lite versions 12.5.0.2421–12.5.0.2434; check for envchk.exe, unsigned processes injected into notepad.exe or conhost.exe, and outbound QUIC (UDP 443) to non-sanctioned destinations. Sysmon EID 1 with parent-process image path filters for notepad.exe or conhost.exe spawning child processes will surface post-injection activity. Update to 12.6.0.2445.