home.social

#daemontools — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #daemontools, aggregated by home.social.

  1. RE: infosec.exchange/@j91321/11653

    Seen some people online speculating whether #DAEMONTools and #JDownloader were compromised by the same adversary. I guess because people associate both of these tools with piracy?

    I would be surprised if this was the case. The DAEMONTools compromise had very competent tradecraft. There was proper enumeration, targeting with different minimalistic payloads. I've seen some of the hands-on activity from mcrypto.chiper payload. It was mostly living-off-the-land. Low noise enumeration, then louder attempts at credential dumping. Skedaddled when they noticed EDR.

    JDownloader so far seem like pack a bunch of Python scripts, drop TOR and YOLO.

  2. RE: infosec.exchange/@j91321/11653

    Seen some people online speculating whether #DAEMONTools and #JDownloader were compromised by the same adversary. I guess because people associate both of these tools with piracy?

    I would be surprised if this was the case. The DAEMONTools compromise had very competent tradecraft. There was proper enumeration, targeting with different minimalistic payloads. I've seen some of the hands-on activity from mcrypto.chiper payload. It was mostly living-off-the-land. Low noise enumeration, then louder attempts at credential dumping. Skedaddled when they noticed EDR.

    JDownloader so far seem like pack a bunch of Python scripts, drop TOR and YOLO.

  3. RE: infosec.exchange/@j91321/11653

    Seen some people online speculating whether #DAEMONTools and #JDownloader were compromised by the same adversary. I guess because people associate both of these tools with piracy?

    I would be surprised if this was the case. The DAEMONTools compromise had very competent tradecraft. There was proper enumeration, targeting with different minimalistic payloads. I've seen some of the hands-on activity from mcrypto.chiper payload. It was mostly living-off-the-land. Low noise enumeration, then louder attempts at credential dumping. Skedaddled when they noticed EDR.

    JDownloader so far seem like pack a bunch of Python scripts, drop TOR and YOLO.

  4. RE: infosec.exchange/@j91321/11653

    Seen some people online speculating whether #DAEMONTools and #JDownloader were compromised by the same adversary. I guess because people associate both of these tools with piracy?

    I would be surprised if this was the case. The DAEMONTools compromise had very competent tradecraft. There was proper enumeration, targeting with different minimalistic payloads. I've seen some of the hands-on activity from mcrypto.chiper payload. It was mostly living-off-the-land. Low noise enumeration, then louder attempts at credential dumping. Skedaddled when they noticed EDR.

    JDownloader so far seem like pack a bunch of Python scripts, drop TOR and YOLO.

  5. Daemon Tools Software Trojanized in Supply Chain Attack

    Malware was discovered hidden in certain Daemon Tools Lite installers, prompting developer Disc Soft to issue a clean build and confirm a supply chain attack had compromised their system. A malware-free version was released within 12 hours of notification.

    osintsights.com/daemon-tools-s

    #SupplyChainAttack #MalwareOperations #DaemonTools #EmergingThreats

  6. Headline: DAEMON TOOLS supply chain attack ongoing since April, thousands affected

    Subtitle: Security researchers have identified an active supply chain compromise in #DAEMONTools installers impacting users globally since April 2026.

    Source: neowin.net/news/daemon-tools-s

    #Security

  7. Headline: DAEMON TOOLS supply chain attack ongoing since April, thousands affected

    Subtitle: Security researchers have identified an active supply chain compromise in #DAEMONTools installers impacting users globally since April 2026.

    Source: neowin.net/news/daemon-tools-s

    #Security

  8. Headline: DAEMON TOOLS supply chain attack ongoing since April, thousands affected

    Subtitle: Security researchers have identified an active supply chain compromise in #DAEMONTools installers impacting users globally since April 2026.

    Source: neowin.net/news/daemon-tools-s

    #Security

  9. Headline: DAEMON TOOLS supply chain attack ongoing since April, thousands affected

    Subtitle: Security researchers have identified an active supply chain compromise in #DAEMONTools installers impacting users globally since April 2026.

    Source: neowin.net/news/daemon-tools-s

    #Security

  10. Headline: DAEMON TOOLS supply chain attack ongoing since April, thousands affected

    Subtitle: Security researchers have identified an active supply chain compromise in #DAEMONTools installers impacting users globally since April 2026.

    Source: neowin.net/news/daemon-tools-s

    #Security

  11. DAEMON Tools Lite wurde gehackt: Seit Anfang April verteilte die offizielle Website eine mit Trojanern infizierte Version. Betroffen sind Build 12.5.0.2421 bis 12.5.0.2434. #DAEMONTools #Malware winfuture.de/news,158542.html?

  12. DAEMON Tools Lite wurde gehackt: Seit Anfang April verteilte die offizielle Website eine mit Trojanern infizierte Version. Betroffen sind Build 12.5.0.2421 bis 12.5.0.2434. #DAEMONTools #Malware winfuture.de/news,158542.html?

  13. DAEMON Tools Lite wurde gehackt: Seit Anfang April verteilte die offizielle Website eine mit Trojanern infizierte Version. Betroffen sind Build 12.5.0.2421 bis 12.5.0.2434. #DAEMONTools #Malware winfuture.de/news,158542.html?

  14. DAEMON Tools Lite wurde gehackt: Seit Anfang April verteilte die offizielle Website eine mit Trojanern infizierte Version. Betroffen sind Build 12.5.0.2421 bis 12.5.0.2434. #DAEMONTools #Malware winfuture.de/news,158542.html?

  15. DAEMON Tools Lite wurde gehackt: Seit Anfang April verteilte die offizielle Website eine mit Trojanern infizierte Version. Betroffen sind Build 12.5.0.2421 bis 12.5.0.2434. #DAEMONTools #Malware winfuture.de/news,158542.html?

  16. A month-long breach saw DAEMON Tools' official installers distributing malware, signed with *their own* legitimate digital certificates. Kaspersky researchers uncovered this sophisticated supply chain compromise, which bypassed standard security checks and targeted high-value organizations in retail, government, and manufacturing for espionage. The attackers used multi-protocol C2…

    tpp.blog/192uc7c

    #cybersecurity #daemontools #supplychaincompromise

    🤖 This post was AI-generated.

  17. DAEMON Tools Breach Exposes Thousands to Malware

    A recent breach at DAEMON Tools exposed thousands to malware, prompting an immediate response from the company to secure its infrastructure and release a clean build of its software. Version 12.6 of DAEMON Tools Lite has been confirmed safe, and users of paid versions can continue using their software as usual.

    osintsights.com/daemon-tools-b

    #SupplyChain #Malware #SoftwareBreach #EmergingThreats #DaemonTools

  18. Daemon Tools: backdoor nascosta nell’installer
    I ricercatori di Kaspersky hanno individuato una backdoor nell’installer di Daemon Tools, popolare software per il montaggio di immagini software tramite unità ottiche virtuali. Si tratta del classico attacco supply chain che prevede l’accesso ai server usati per il download delle applicazioni. AVB Disc Soft ha rimosso gli installer infetti e pubblicato nuove versioni.

    @sicurezza #daemontools

    punto-informatico.it/daemon-to

  19. Daemon Tools: backdoor nascosta nell’installer
    I ricercatori di Kaspersky hanno individuato una backdoor nell’installer di Daemon Tools, popolare software per il montaggio di immagini software tramite unità ottiche virtuali. Si tratta del classico attacco supply chain che prevede l’accesso ai server usati per il download delle applicazioni. AVB Disc Soft ha rimosso gli installer infetti e pubblicato nuove versioni.

    @sicurezza #daemontools

    punto-informatico.it/daemon-to

  20. Daemon Tools: backdoor nascosta nell’installer
    I ricercatori di Kaspersky hanno individuato una backdoor nell’installer di Daemon Tools, popolare software per il montaggio di immagini software tramite unità ottiche virtuali. Si tratta del classico attacco supply chain che prevede l’accesso ai server usati per il download delle applicazioni. AVB Disc Soft ha rimosso gli installer infetti e pubblicato nuove versioni.

    @sicurezza #daemontools

    punto-informatico.it/daemon-to

  21. Daemon Tools: backdoor nascosta nell’installer
    I ricercatori di Kaspersky hanno individuato una backdoor nell’installer di Daemon Tools, popolare software per il montaggio di immagini software tramite unità ottiche virtuali. Si tratta del classico attacco supply chain che prevede l’accesso ai server usati per il download delle applicazioni. AVB Disc Soft ha rimosso gli installer infetti e pubblicato nuove versioni.

    @sicurezza #daemontools

    punto-informatico.it/daemon-to

  22. Daemon Tools: backdoor nascosta nell’installer
    I ricercatori di Kaspersky hanno individuato una backdoor nell’installer di Daemon Tools, popolare software per il montaggio di immagini software tramite unità ottiche virtuali. Si tratta del classico attacco supply chain che prevede l’accesso ai server usati per il download delle applicazioni. AVB Disc Soft ha rimosso gli installer infetti e pubblicato nuove versioni.

    @sicurezza #daemontools

    punto-informatico.it/daemon-to

  23. DAEMON Tools installers were trojanized in a supply-chain attack, delivering a backdoor to thousands of systems worldwide since April 8 🌐
    The malware affected versions 12.5.0.2421–12.5.0.2434, targeting high-value organizations and enabling remote code execution via compromised binaries 🛡️

    🔗 bleepingcomputer.com/news/secu

    #TechNews #Daemon #DAEMONTools #Malware #Security #Microsoft #Windows #Backdoor #Attack #Threat #CyberSecurity #Software #InfoSec #Hacking #Safety #Digital #Computing #Protection

  24. DAEMON Tools installers were trojanized in a supply-chain attack, delivering a backdoor to thousands of systems worldwide since April 8 🌐
    The malware affected versions 12.5.0.2421–12.5.0.2434, targeting high-value organizations and enabling remote code execution via compromised binaries 🛡️

    🔗 bleepingcomputer.com/news/secu

    #TechNews #Daemon #DAEMONTools #Malware #Security #Microsoft #Windows #Backdoor #Attack #Threat #CyberSecurity #Software #InfoSec #Hacking #Safety #Digital #Computing #Protection