Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

947+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. DAEMON Tools Devs Confirm Breach, Release Malware-Free Version
DAEMON Tools Devs Confirm Breach, Release Malware-Free Version
NEWS

DAEMON Tools Devs Confirm Breach, Release Malware-Free Version

Disc Soft Limited, the maker of DAEMON Tools Lite, has confirmed their software was trojanized in a supply chain attack and has released a new, malware-free version for affected users to download.

Dylan H.

News Desk

May 6, 2026
5 min read

Disc Soft Limited, the developer behind the widely-used DAEMON Tools Lite virtual drive software, has confirmed that their software distribution was compromised in a supply chain attack that resulted in trojanized versions of DAEMON Tools being distributed to users. The company has released a clean, malware-free version and is urging all users to update immediately.

The disclosure was reported by BleepingComputer, which has been tracking an increase in supply chain attacks targeting popular software utilities distributed through official developer channels.

What Is DAEMON Tools?

DAEMON Tools Lite is a virtual drive and disc image mounting application with a long history of use among Windows users. The software allows users to mount ISO, MDS, MDX, and other disc image formats as virtual CD/DVD/Blu-ray drives without physical media. It has been a staple utility for software developers, gamers, and IT professionals for over two decades.

The software's broad install base — spanning millions of users globally — makes it an attractive target for threat actors seeking to achieve mass distribution of malware through a trusted, legitimate software channel.

The Supply Chain Attack

Disc Soft Limited confirmed that attackers compromised the software's build pipeline or distribution infrastructure, resulting in a version of DAEMON Tools Lite being signed with a legitimate certificate and distributed through official channels but containing embedded malware. This type of attack is particularly dangerous because:

  • The software is digitally signed, bypassing many security checks that flag unsigned executables
  • Users downloading from the official site have no reason to suspect the file is malicious
  • Antivirus products that rely on reputation scoring may not flag a known-good signed binary
  • Existing installations may auto-update to the compromised version

The exact malware payload has not been publicly detailed at the time of writing, but supply chain attacks of this nature typically deliver information stealers, remote access trojans (RATs), or cryptocurrency miners — chosen for their ability to operate silently while monetizing the compromised host.

Timeline and Scope

Disc Soft Limited has confirmed the breach but has not yet disclosed the full timeline of how long the trojanized version was in distribution, how many users downloaded it, or the full nature of the malicious payload. The company has stated that:

  1. The compromise has been contained
  2. A clean, malware-free version has been released
  3. Users who downloaded DAEMON Tools Lite during the affected period are urged to update immediately

The specific version numbers affected and the precise dates of the compromise window have not been publicly confirmed at the time of reporting.

Recommendations for Affected Users

Immediate Steps

If you have DAEMON Tools Lite installed, take the following steps regardless of whether you believe your version was affected:

  1. Update to the latest clean version immediately from the official Disc Soft website
  2. Run a full antivirus/EDR scan of your system to detect and remove any malicious components that may have been installed
  3. Review recently installed programs — check for any software installed around the time of the DAEMON Tools update that you did not intentionally install
  4. Check browser credentials — information stealers commonly target saved browser passwords; consider rotating passwords for important accounts
  5. Monitor for suspicious network activity — outbound connections to unusual endpoints may indicate malware still communicating with command-and-control infrastructure

For IT and Security Teams

If DAEMON Tools Lite is deployed in enterprise environments:

- Query your endpoint management platform for DAEMON Tools
  installations and identify the installed version on each host
 
- If compromised versions are identified, isolate affected hosts
  and begin incident response procedures
 
- Review EDR telemetry around the time of the DAEMON Tools update
  for process injection, credential access, or data staging activity
 
- Check outbound network logs for connections to known malware C2
  infrastructure from hosts with DAEMON Tools installed
 
- Rotate credentials for any accounts used on potentially
  compromised hosts

Supply Chain Attack Context

The DAEMON Tools compromise is part of a broader trend of supply chain attacks targeting developer tools, utilities, and open-source packages. Recent notable incidents include:

IncidentVectorImpact
Trivy GitHub Actions compromiseCI/CD pipeline75 tags hijacked, infostealer pushed
Axios npm supply chain attackMaintainer social engineeringJavaScript RAT distributed
PyPI malicious packagesFake packagesCredential theft
VS Code extension hijacksExtension marketplaceDeveloper machine compromise

The common thread is attackers targeting the trust relationship between software developers and their users. When a legitimate, signed binary from a known developer is trojanized, the social and technical barriers that typically protect users are removed.

How to Verify the Clean Version

When downloading the updated DAEMON Tools Lite:

  1. Download only from the official Disc Soft website — do not use third-party download sites or mirrors
  2. Verify the digital signature of the downloaded executable before running it:
    • Right-click the installer → Properties → Digital Signatures tab
    • Confirm the signer is "Disc Soft Limited" with a valid, trusted certificate chain
  3. Compare the file hash against any official hash published by Disc Soft in their security advisory
  4. Scan with multiple antivirus engines before installation — submitting to VirusTotal is a quick additional check

References

  • BleepingComputer — DAEMON Tools Devs Confirm Breach, Release Malware-Free Version
  • Disc Soft Limited — Official Security Advisory
  • CISA — Software Supply Chain Security Guidance
#Malware#Data Breach#Supply Chain#BleepingComputer#DAEMON Tools#Trojan#Software Security

Related Articles

Trivy Vulnerability Scanner Breached to Push Infostealer via GitHub Actions

The Trivy open-source vulnerability scanner was compromised in a supply chain attack by the threat group TeamPCP, which hijacked 75 release tags and...

6 min read

Learning from the Vercel Breach: Shadow AI and OAuth Sprawl

The Vercel breach, traced to a compromised third-party AI tool with OAuth access, illustrates how Shadow AI adoption and unchecked OAuth integrations are...

5 min read

Video Service Vimeo Confirms Anodot Breach Exposed User Data

Vimeo has confirmed that customer and user data was accessed without authorization following a security breach at Anodot, a data anomaly detection...

6 min read
Back to all News