Skip to main content
DAEMON Tools Breach: 27 Days of Trojanized InstallersIncident
5 min readFor Compliance Teams

DAEMON Tools Breach: 27 Days of Trojanized Installers

Between April 8 and May 5, 2026, Windows users who downloaded DAEMON Tools from its official website unknowingly installed malware. AVB Disc Soft's legitimate installers were compromised to deliver QUIC RAT, a remote access trojan that gave attackers control over infected systems. The breach affected users in over 100 countries before Kaspersky identified the attack and AVB Disc Soft released a clean version (12.6) on May 5.

This attack wasn't due to phishing or a fake domain. Users followed security practices by downloading from the official site and still got compromised. This highlights the danger of supply chain attacks: they exploit trust.

Timeline

April 8, 2026: Attackers compromise DAEMON Tools' build or distribution infrastructure. Trojanized installers begin serving from official download channels.

April 8 - May 5, 2026: During this 27-day period, users download and execute compromised installers. The malware operates undetected globally.

May 5, 2026: Kaspersky publicly identifies the attack. AVB Disc Soft releases DAEMON Tools Lite version 12.6, removing the malicious payload.

Post-May 5: Organizations begin incident response and remediation across affected systems.

Which Controls Failed or Were Missing

1. Build Environment Integrity

Attackers inserted malware into official installers, indicating they gained access to AVB Disc Soft's build pipeline or distribution infrastructure. Your build environment should be as secure as your production systems, if not more so, since it's the chokepoint for all deployments.

The failure: insufficient access controls and monitoring on build systems. If an attacker can modify your build artifacts, downstream security controls become irrelevant.

2. Code Signing Validation

The compromised installers were likely signed with AVB Disc Soft's legitimate certificate. Code signing only proves authenticity if you protect the signing keys and audit what gets signed.

The failure: either the signing process lacked verification, or the signing key was compromised. Both scenarios indicate missing controls around cryptographic material management.

3. Distribution Monitoring

For 27 days, trojanized installers were served from official channels without detection. This suggests AVB Disc Soft lacked real-time integrity monitoring on their distribution infrastructure.

The failure: no automated comparison between what was built, what was signed, and what was distributed. Hash mismatches should trigger immediate alerts.

4. Third-Party Software Validation (Customer-Side)

Organizations that deployed DAEMON Tools during this window likely lacked controls to verify software integrity before installation. Even when downloading from official sources, you need mechanisms to detect anomalous behavior.

The failure: no application control policies, no behavioral monitoring for newly installed software, no comparison of downloaded file hashes against known-good values.

What the Relevant Standards Require

ISO/IEC 27001:2022 — Supply Chain Security

Annex A 5.19 requires defining and implementing security requirements for ICT supply chains, including:

  • Establishing security requirements in agreements with suppliers
  • Monitoring supplier security practices
  • Defining incident response procedures for supply chain compromises

Annex A 8.30 requires security controls throughout the development lifecycle, including secure build environments and change management for externally developed software.

NIST 800-53 Rev 5 — Software Supply Chain Security

SA-10 requires configuration management throughout the system development lifecycle, including version control and integrity verification.

SA-12 mandates supply chain protection measures throughout the system development lifecycle, including risk assessments.

SR-3 requires integrity verification tools to detect unauthorized changes to software and firmware.

SR-4 requires documenting and monitoring the provenance of system components.

PCI DSS v4.0.1 — Change Management and Code Integrity

Requirement 6.3.2 states that all system components must be protected from known vulnerabilities by installing applicable security patches/updates, including third-party software.

Requirement 6.5.3 requires that all deployed code is protected from unauthorized modification, extending to the software acquisition process.

Lessons and Action Items for Your Team

1. Inventory Your Software Supply Chain

Create a complete list of third-party software in your environment. For each application, document:

  • Where you download it from
  • How you verify integrity
  • How frequently you update it
  • What systems it's installed on
  • Whether it has network access

If you can't answer these questions about DAEMON Tools, you can't answer them about your other vendor software either.

2. Implement Hash Verification for All Downloads

Before installing any third-party software:

  • Download the installer and the vendor-provided hash (SHA-256 minimum)
  • Verify the hash matches before execution
  • Automate this check in your deployment tooling

If the vendor doesn't publish hashes, that's a vendor selection problem. Require it in your procurement process.

3. Monitor New Software Installation

Deploy endpoint detection that flags:

  • Installation of software not in your approved list
  • New executables making network connections
  • Processes spawned by installer programs that persist after installation

QUIC RAT would have exhibited unusual network behavior. Behavioral monitoring could have reduced your exposure window from 27 days to hours.

4. Isolate Build and Distribution Infrastructure

If you develop software internally:

  • Separate your build environment from corporate networks
  • Require multi-party approval for build pipeline changes
  • Log all access to build systems and signing keys
  • Implement integrity checks that compare build outputs to source code

If you distribute software to customers, implement automated integrity monitoring on your distribution infrastructure. Alert on any file hash changes that don't correspond to documented releases.

5. Define Supply Chain Incident Response Procedures

When a vendor announces a compromise:

  • How quickly can you identify which systems have the affected software?
  • What's your process for isolating potentially compromised systems?
  • How do you verify whether the malware executed, or just got installed?

Document these procedures now. When Kaspersky published the DAEMON Tools findings on May 5, organizations with documented supply chain incident response procedures could act within hours. Those without procedures spent days just figuring out what to check.

6. Require Vendor Security Attestations

In your contracts with software vendors, require:

  • Annual SOC 2 Type II reports that include build environment controls
  • Notification within 24 hours of any suspected supply chain compromise
  • Public disclosure of security incidents affecting distributed software

These requirements won't prevent attacks, but they create accountability and ensure you're not the last to know when something goes wrong.

The DAEMON Tools attack succeeded because it exploited the trust relationship between vendor and customer. Your defense requires assuming that trust will be violated -- not through vendor malice, but through vendor compromise. Verify what you install, monitor what you run, and have a plan for when the next supply chain attack hits your environment.

Topics:Incident

You Might Also Like