Targeted Breach: Analyzing the DAEMON Tools Supply Chain Attack
When a trusted piece of software becomes a delivery vehicle for malware, the entire security chain collapses. This is the reality of a recent supply chain attack targeting DAEMON Tools, where attackers compromised the software to deploy a tiered series of malicious payloads. While many users were hit with basic information gatherers, a minor subset of high-value targets faced a far more sophisticated threat: the QUIC RAT.
This attack highlights a growing trend in cyber warfare where threat actors move away from “spray and pray” tactics toward precision targeting, using legitimate software updates or installers to bypass traditional defenses.
The Anatomy of the Infection: A Tiered Payload Strategy
The attackers didn’t treat every infected machine the same. Instead, they used a tiered approach to deploy malware based on the value of the target. According to research from Kaspersky, the attack unfolded in three distinct levels of severity:
- The Information Collector: The majority of infected machines received only this initial payload. Its primary goal was to gather basic system data, serving as a reconnaissance tool for the attackers.
- The Minimalistic Backdoor: Pushed to approximately a dozen organizations, this payload was significantly more dangerous. It allowed attackers to execute commands, download additional files, and run shellcode payloads directly in memory—a technique that makes detection by standard security tools much more tough.
- QUIC RAT: The most complex payload was discovered on a single machine belonging to an educational institution in Russia. This sophisticated backdoor is capable of injecting malicious code into legitimate system processes, specifically
notepad.exeandconhost.exe.
Technical Deep Dive: Why QUIC RAT is a Major Threat
The QUIC RAT isn’t your average piece of malware. Its strength lies in its communication flexibility. To avoid detection by network monitoring tools, it supports a wide array of Command and Control (C2) communication protocols, including:
- HTTP and HTTP/3
- UDP, TCP, and WSS
- QUIC and DNS
By rotating through these protocols, the malware can blend in with normal web traffic, making it incredibly difficult for network administrators to spot the “heartbeat” of the infection.
Who Was Targeted?
The scale of the attack reached 100 infected organizations globally. While the breach was widespread, the geographical distribution was concentrated in specific regions. Affected organizations were primarily located in:
- Russia and Belarus
- Brazil
- Turkey
- Spain, Germany, France, and Italy
- China and Thailand
Kaspersky’s analysis indicates that 10% of the affected systems belonged to businesses and organizations. The most complex backdoors were selectively deployed to government, scientific, manufacturing, and retail organizations. This precision suggests the attackers were conducting a targeted operation, though it remains unclear if the ultimate goal was long-term cyberespionage or “substantial game hunting” for financial gain.
A Growing Trend in Supply Chain Vulnerabilities
The DAEMON Tools breach is not an isolated incident. It fits into a broader, more alarming pattern of supply chain attacks. Recently, similar compromises have hit security-focused firms and tools, including Trivy, Checkmarx, and Bitwarden. Over 150 packages available through open-source repositories have been targeted. With at least six notable supply chain attacks occurring last year alone, the industry is seeing a shift toward attacking the “source of truth”—the software we trust to keep us safe.
- Tiered Deployment: Attackers use basic payloads for reconnaissance and save complex tools (like QUIC RAT) for high-value targets.
- Memory-Only Execution: The use of shellcode in memory is designed to evade disk-based antivirus scans.
- Process Injection: Watch for unusual activity in common processes like
notepad.exeandconhost.exe.
How to Secure Your Systems
If you or your organization use DAEMON Tools, immediate action is required to ensure your environment hasn’t been compromised.

1. Comprehensive System Scans
Run a full system scan using reputable antivirus software. Do not rely on “quick scans,” as these may miss dormant payloads hidden in non-standard directories.
2. Check Indicators of Compromise (IoCs)
Windows users should review the specific indicators of compromise listed in the Kaspersky technical report to identify if their machines show signs of the minimalistic backdoor or QUIC RAT.
3. Monitor High-Risk Directories
For those with advanced technical capabilities, monitor for suspicious code injections into legitimate system processes. Pay close attention to executables launched from publicly accessible or temporary directories, such as:
TempAppDataPublic
FAQ: Understanding the DAEMON Tools Attack
What is a supply chain attack?
A supply chain attack occurs when a threat actor infiltrates a trusted third-party vendor to inject malicious code into a legitimate software update or installer, which is then distributed to all the vendor’s customers.
What makes QUIC RAT different from other malware?
Its ability to use multiple C2 protocols (like HTTP/3 and QUIC) and inject itself into standard Windows processes makes it highly stealthy and resilient against detection.
Am I at risk if I have DAEMON Tools installed?
Yes. Anyone using the software should perform a deep scan and check for the specific indicators of compromise identified by researchers.