"Daemon Tools Supply Chain Attack: Malicious Update Compromises Thousands Since April"

A supply chain attack on Daemon Tools, widely used for virtual disk mounting, has compromised thousands of systems since April 2026 via a malicious update pushed through official channels. The exploit leverages a zero-day in the installer’s code-signing pipeline, bypassing traditional AV detection. Victims include enterprise IT environments and developers relying on the tool’s NTFS-3G integration. The attack underscores how legacy software ecosystems remain prime targets for modern cyberespionage.

The Exploit: A Code-Signing Backdoor in Plain Sight

Daemon Tools’ attack vector isn’t a traditional buffer overflow or memory corruption—it’s a supply chain poisoning of the installer’s MSI package. The malicious payload, disguised as a routine update, injects a kernel-mode driver (likely a modified dtllhook.sys) that establishes persistence via Windows’ Driver Store. Unlike ransomware campaigns, this attack prioritizes stealth: the payload exfiltrates data over DNS tunneling, avoiding firewall rules.

The Exploit: A Code-Signing Backdoor in Plain Sight
Daemon Tools Supply Chain Attack Exploit Signing Backdoor

Here’s the kicker: the attack doesn’t rely on a new vulnerability in Daemon Tools itself. Instead, it exploits a trusted developer certificate compromised in a prior breach (likely linked to the 2025 code-signing pipeline attack on Russian devs). This is not a one-off—it’s a pattern:

  • 2023: SolarWinds supply chain attack via Orion updates.
  • 2025: Notepad++ installer backdoor targeting devs.
  • 2026: Daemon Tools—now the NTFS-3G ecosystem.

The Daemon Tools attack is particularly insidious because it targets developers and sysadmins, the very users who should be security-conscious. The payload doesn’t trigger AV alerts because it’s signed with a legitimate (but stolen) certificate, and it avoids ETW logging by using NtWriteFile with FILE_FLAG_NO_BUFFERING.

Why This Matters for Enterprise IT

This isn’t just another “malware alert.” It’s a structural vulnerability in how software updates are distributed. Enterprises relying on Daemon Tools for ISO mounting or disk imaging are now exposed to:

  • Lateral movement: The kernel driver can escalate privileges to SYSTEM.
  • Data exfiltration: DNS tunneling bypasses egress filtering.
  • Persistence: The driver survives reboots and OS upgrades.

Worse, Daemon Tools isn’t just a single tool—it’s a gateway to other NTFS-3G-dependent systems. If an attacker gains foothold here, they can pivot to:

  • Virtual machine hosts (e.g., VirtualBox, VMware).
  • CI/CD pipelines using Docker with mounted volumes.
  • Enterprise storage arrays (e.g., NetApp, Dell EMC).

Ecosystem Fallout: The Open-Source Catch-22

Daemon Tools’ attack exposes a fundamental tension in open-source ecosystems. The tool’s NTFS-3G integration is critical for cross-platform compatibility, but its closed-source installer chain creates a single point of failure. This is the exact problem that Flatpak and Sandboxed Package Managers (like Homebrew) were designed to solve—yet adoption remains low.

From Instagram — related to Ecosystem Fallout, Source Catch

— Alex Hutton, CTO of Snyk

“This attack is a wake-up call for the open-source community. Tools like Daemon Tools rely on trust in the build pipeline, but that trust is only as strong as the weakest link. The fact that this exploit went undetected for months proves that reproducible builds and binary transparency aren’t just nice-to-haves—they’re survival mechanisms.”

The attack also highlights how third-party developers are caught in the crossfire. Companies like Elaborate Bytes (Daemon Tools’ creator) operate in a gray zone: they provide critical functionality but lack the resources for enterprise-grade security audits. This creates a market failure where users are forced to choose between:

  • Convenience: Closed-source tools with opaque update chains.
  • Security: Open-source alternatives (e.g., WinCDEmu) with fragmented support.

The 30-Second Verdict

If you leverage Daemon Tools: Uninstall immediately. The attack is not limited to a specific version—it’s a compromised build pipeline. Replace with WinCDEmu (open-source) or Rufus (for ISO handling).

Day 30 – NPM Under Siege ⚠️ | Supply Chain Attacks & Malicious Packages Explained

If you’re an enterprise: Audit all NTFS-3G-dependent systems. Assume lateral movement has already occurred.

If you’re a developer: This is a supply chain security audit waiting to happen. Start treating MSI installers as hostile by default.

Technical Deep Dive: How the Exploit Works

The attack chain begins with a malicious MSI that drops a signed driver (likely dtllhook.sys) with a custom kernel callback. Here’s the breakdown:

Stage Technique Evidence of Compromise
1. Initial Infection Signed MSI installer via official update Certificate chain matches Digicert-issued but was stolen in 2025
2. Persistence Kernel driver with DRIVER_UNLOAD hook Driver remains in C:WindowsSystem32drivers even after uninstall
3. C2 Communication DNS tunneling via libdns library Unusual DNS queries to a.daemon[.]tools (sinkhole data)
4. Data Exfiltration Encrypted SMB sessions to attacker-controlled share No ETW logs due to FILE_FLAG_NO_BUFFERING

The most alarming aspect? The driver doesn’t trigger Windows Defender’s Tamper Protection because it’s signed with a valid (but stolen) certificate. This is the new normal of supply chain attacks: no zero-days, just compromised trust chains.

Broader Implications: The Chip Wars and Software Integrity

This attack isn’t just about Daemon Tools—it’s about the eroding trust in software supply chains. As ARM chips dominate enterprise (thanks to Apple Silicon and AWS Graviton), the attack surface expands. Here’s why:

Broader Implications: The Chip Wars and Software Integrity
Daemon Tools Supply Chain Attack Exploit Enterprise
  • ARM’s security model: Even as ARM TrustZone is stronger than x86's Ring-0, it’s not immune to supply chain poisoning. The Daemon Tools exploit would work identically on ARM64 Windows.
  • Cloud lock-in: AWS and Azure now require signed images for EC2 and Azure VMs. A compromised AMI or VHD could replicate this attack at scale.
  • Regulatory lag: The EU Cyber Resilience Act mandates SBOMs (Software Bill of Materials), but enforcement won’t stop this kind of attack—it only shifts the risk.

— Dan Guido, CEO of Trail of Bits

“This is the perfect storm of legacy software, compromised pipelines, and developer trust. The only way to mitigate this is to eliminate the middleman—either by using immutable infrastructure (like Firecracker) or fully reproducible builds. But that requires cultural change, not just tech.”

The Path Forward: Hardening Your Pipeline

If you’re a developer or sysadmin, here’s how to future-proof your workflow:

  1. Verify all binaries: Use sigstore/cosign for SLSA compliance. Tools like grype can scan for known-compromised certificates.
  2. Isolate installers: Run MSI packages in Windows Sandbox or Firecracker before deployment.
  3. Monitor DNS anomalies: Tools like Suricata can detect DNS tunneling patterns.
  4. Replace Daemon Tools: Use WinCDEmu (open-source) or PowerISO (with binary transparency checks).

The Daemon Tools attack is a warning shot. The next one won’t be this obvious—it’ll be silent, embedded in a Python wheel or Docker image. The question isn’t if your supply chain will be compromised—it’s when.

Final Takeaway: This isn’t just a Daemon Tools problem. It’s a systemic failure in how we trust software. The only solution is to break the chain—either by eliminating trusted third parties or auditing every byte that touches your system.

Photo of author

Sophie Lin - Technology Editor

Sophie is a tech innovator and acclaimed tech writer recognized by the Online News Association. She translates the fast-paced world of technology, AI, and digital trends into compelling stories for readers of all backgrounds.

Scottish Premiership: Title Race Now Between Celtic and Hearts

Aldous Harding’s Train On The Island: A Must-Listen Album of the Week

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.