Kaspersky suspects Chinese hackers planted a backdoor into…
Security researchers at Kaspersky say they have identified a malicious backdoor planted in the popular and long-running Windows disc imaging software, Daemon Tools. The Russian cybersecurity company said on Tuesday that data collected from computers around the world running the Kaspersky antivirus software shows a “widespread” attack is under way, targeting thousands of Windows computers running Daemon Tools.
The hackers, whom Kaspersky has linked to a Chinese-language speaking group based on an analysis of the malware, used the backdoor in Daemon Tools to plant additional malware on a dozen computers across the retail, scientific and manufacturing sectors, as well as government systems. Kaspersky said it had contacted Disc Soft, the company that maintains Daemon Tools, but did not say if the developer responded or took action.
Kaspersky said the supply chain attack is “still active,” suggesting that the hackers can still plant malware on thousands of computers running the disc imaging software. Hackers are increasingly taking aim at the accounts of developers who work on widely used code and software, and abusing that access to push malicious code to anyone who relies on the software.
Security researchers also warned of another attack last month targeting users who visited the website of CPUID , which makes the popular HWMonitor and CPU-Z tools. Ouster’s new color lidar is coming to replace cameras This tiny, magnetic e-reader could stop you from doomscrolling Uber wants to turn its millions of drivers into a sensor grid for self-driving companies Y Combinator alum Skio sells for $105M cash, only raised $8M, founder says Elon Musk testifies that xAI trained Grok on OpenAI models Amazon, Meta join fight to end Google Pay, PhonePe dominance in India On the stand, Elon Musk can’t escape his own tweets
Analysis: Why This Matters
This matters because moves around Daemon Tools can reshape product roadmaps, valuations, and how everyday users interact with tech.
Key Takeaways
- Security researchers at Kaspersky say they have identified a malicious backdoor planted in the popular and long-running Windows disc imaging software, Daemon Tools.
- Kaspersky said it had contacted Disc Soft, the company that maintains Daemon Tools, but did not say if the developer responded or took action.
- It’s not known if the macOS version of Daemon Tools was compromised, or if other apps made by Disc Soft are affected.
Watch for follow-up announcements from competing platforms — the industry rarely stays quiet for long after news like this.
Source: TechCrunch
