ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Catch Cheater
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Bug Sweep TSCM Investigation
      • Workers Compensation Fraud Investigation
      • Asset and Hidden Finances Investigations
    • Cyber Security
      • DIGITAL EVIDENCE AUTHENTICATION
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Assets Search 
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > Uncategorized > Kaspersky suspects Chinese language hackers planted a backdoor into Daemon Tools in ‘current’ attack
    Kaspersky suspects Chinese language hackers planted a backdoor into Daemon Tools in ‘current’ attack
    05
    May
    • ForensicsS
    • 0 Comments

    Kaspersky suspects Chinese language hackers planted a backdoor into Daemon Tools in ‘current’ attack

    Mobile forensics

    Security researchers at Kaspersky verbalize they’ve identified a malicious backdoor planted in the preferred and long-running Windows disc imaging design, Daemon Tools. 

    The Russian cybersecurity company mentioned on Tuesday that recordsdata restful from computers across the enviornment running the Kaspersky antivirus design shows a “current” attack is beneath manner, focusing on thousands of Windows computers running Daemon Tools.

    The hackers, whom Kaspersky has linked to a Chinese language-language speaking neighborhood in accordance to an analysis of the malware, dilapidated the backdoor in Daemon Tools to plant extra malware on a dozen computers across the retail, scientific and manufacturing sectors, apart from to authorities programs. Kaspersky mentioned the hacking of those whine computers implied a “focused” effort. 

    The corporate mentioned the focused organizations would possibly perhaps possibly be found in Russia, Belarus, and Thailand.

    Kaspersky mentioned the backdoor become once first detected on April 8.

    Kaspersky mentioned it had contacted Disc Tender, the corporate that maintains Daemon Tools, but didn’t verbalize if the developer spoke back or took action. Kaspersky mentioned the provide chain attack is “collected active,” suggesting that the hackers can collected plant malware on thousands of computers running the disc imaging design.

    This is the most contemporary in a string of so-known as “provide chain” attacks that contain focused builders of current design in contemporary months. Hackers are an increasing number of taking goal at the accounts of builders who work on broadly dilapidated code and design, and abusing that procure entry to to push malicious code to someone who depends on the design. This potential lets the hackers damage loyal into a shipshape resolution of computers loyal now when their malicious code is delivered as a tool change.

    Earlier this year, hackers related with the Chinese language authorities hijacked the preferred text improving design Notepad++ to whine malware to a resolution of organizations with interests in East Asia. Security researchers also warned of every other attack closing month focusing on customers who visited the acquire predicament of CPUID, which makes the preferred HWMonitor and CPU-Z instruments.

    TechCrunch downloaded the Windows installer from Daemon Tools’ net predicament, and the file perceived to contain the backdoor after we checked it with the acquire malware scanner service VirusTotal.

    It’s no longer identified if the macOS model of Daemon Tools become once compromised, or if relatively loads of apps made by Disc Tender are affected.

    When contacted for observation, a Disc Tender representative mentioned they are “attentive to the roar and are right now investigating the plot back.”

    “Our team is treating this topic with the very best priority and is actively working to evaluate and take care of the plot back. At this stage, we’re no longer in a living to substantiate whine principal points referenced in the roar. Alternatively, we’re taking all compulsory steps to remediate any potential dangers and to procure optimistic the security of our customers,” the representative mentioned.

    Attain you understand extra about the cyberattack focusing on Daemon Tools customers? Did you receive an antivirus alert announcing you contain been affected? We are looking to listen to from you. To contact this reporter securely, reach out thru Brand username zackwhittaker.1337.

    Whilst you aquire thru links in our articles, we would possibly perhaps possibly invent a limited commission. This doesn’t contain an affect on our editorial independence.

    Zack Whittaker is the security editor at TechCrunch. He also authors the weekly cybersecurity e-newsletter, this week in security.

    He’ll also be reached thru encrypted message at zackwhittaker.1337 on Brand. It’s seemingly you’ll perhaps additionally contact him by electronic mail, or to verify outreach, at zack.whittaker@techcrunch.com.

    Look Bio

    Be taught Extra

    • Tags

    • cybercrime email-fraud forensics|digital-forensics hacker Investigation Kaspersky malware online-scam phishing-attack private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker Suspects

    Recent Posts

    • Consultants warn Amazon’s Straightforward Electronic mail Carrier is being abused to initiating ‘huge volume’ of phishing attacks
    • Kaspersky suspects Chinese language hackers planted a backdoor into Daemon Tools in ‘current’ attack
    • Hackers take college students’ files in the future of breach at training tech wide Instructure
    • Vimeo data breach exposes private data of 119,000 of us
    • Karakurt extortion gang ‘cool case’ negotiator gets 8.5 years in penal advanced

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    Consultants warn Amazon’s Straightforward Electronic mail Carrier is being abused to initiating ‘huge volume’ of phishing attacks
    May 5, 2026
    Consultants warn Amazon’s Straightforward Electronic mail Carrier is being abused to initiating ‘huge volume’ of phishing attacks
    Kaspersky suspects Chinese language hackers planted a backdoor into Daemon Tools in ‘current’ attack
    May 5, 2026
    Kaspersky suspects Chinese language hackers planted a backdoor into Daemon Tools in ‘current’ attack
    Hackers take college students’ files in the future of breach at training tech wide Instructure
    May 5, 2026
    Hackers take college students’ files in the future of breach at training tech wide Instructure

    Popular Tags

    administration Confirms Crypto cybercrime cybercrimefraud cybercrimehacker cybercrimephishing-attack cybersecurity Department digital-forensics email-fraud Epstein forensics|digital-forensics Former fraud hacker hackers House Investigation investigationcybersecurity Judge Justice Korean Launches malware malwarefraud malwarephishing-attack Microsoft Minnesota Nancy North online-scam online-scamphishing-attack opens Patel phishing-attack Police private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker probe Trump warns

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO