“daemon tools supply chain attack compromises official installers with malware a newly identified supply chain attack targeting daemon tools software has compromised its installers to serve a malicious payload, according to findings from kaspersky. " these installers are distribut…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
88%
“and http / 3, and comes equipped with capabilities to inject payloads into legitimate " notepad. exe " and " conhost. exe " processes. the activity has not been attributed to any known threat actor or group. but evidence points to it being the work of a chinese - speaking adversa…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071.001Web Protocols
77%
“, such as russia, brazil, turkey, spain, germany, france, italy, and china. however, the next - stage backdoor has been delivered only to a dozen hosts, indicating a targeted approach. the systems that received the follow - on malware have been flagged as belonging to retail, sci…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.004Unix Shell
65%
“typically happens during system startup, an implant is activated on the compromised host. it ' s designed to send an http get request to an external server ( " env - check. daemontools [. ] cc " ) – a domain registered on march 27, 2026 – in order to receive a shell command that …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1072Software Deployment Tools
58%
“daemon tools supply chain attack compromises official installers with malware a newly identified supply chain attack targeting daemon tools software has compromised its installers to serve a malicious payload, according to findings from kaspersky. " these installers are distribut…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1072Software Deployment Tools
50%
“and http / 3, and comes equipped with capabilities to inject payloads into legitimate " notepad. exe " and " conhost. exe " processes. the activity has not been attributed to any known threat actor or group. but evidence points to it being the work of a chinese - speaking adversa…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071Application Layer Protocol
32%
“, such as russia, brazil, turkey, spain, germany, france, italy, and china. however, the next - stage backdoor has been delivered only to a dozen hosts, indicating a targeted approach. the systems that received the follow - on malware have been flagged as belonging to retail, sci…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
31%
“daemon tools supply chain attack compromises official installers with malware a newly identified supply chain attack targeting daemon tools software has compromised its installers to serve a malicious payload, according to findings from kaspersky. " these installers are distribut…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky.
"These installers are distributed from the legitimate website of DAEMON Tools and are signed with digital certificates belonging to DAEMON Tools developers," Kaspersky researchers Igor Kuznetsov, Georgy Kucherin, Leonid