Daemon Tools developer Discisoft has confirmed that versions of its virtual disc mounting software contained Trojan malware. The company made the announcement on its official forum and support channels this week, advising users to scan systems and uninstall affected builds.
Confirmation Details
Discisoft stated the trojanization affected specific recent updates distributed through its download servers. The malware, identified as a remote access trojan, allowed unauthorized system access. Company representatives noted the compromise occurred during a supply chain attack on their update mechanism.
Users reported unusual network activity and file modifications after installing the software. Antivirus vendors, including those from major security firms, flagged the infected executables. Discisoft urged immediate action, providing clean download links for verified versions.
Impact on Users
The breach exposes risks in software distribution. For more on spotting online threats like this, see our coverage of SEO scammers who exploit similar vulnerabilities.
Affected users face potential data theft, including credentials and personal files. The trojan evaded initial detection by mimicking legitimate Daemon Tools processes. Security researchers confirmed the payload connected to command-and-control servers overseas.
Company Response
Discisoft posted: “We confirm unauthorized modifications to our software binaries. Our team has isolated the issue, and all current downloads are secure.” The developer committed to enhanced signing and verification processes.
The firm recommended running full system scans with updated antivirus tools. It also disabled automatic updates temporarily to prevent further incidents.
Background on Daemon Tools
Daemon Tools, used for creating virtual CD/DVD drives and mounting disc images, has served gamers and IT professionals for years. Past incidents include copy protection disputes, but this marks the first confirmed malware insertion.
Supply chain attacks have risen, targeting trusted software providers. Similar cases hit other utilities, underscoring verification needs. Users downloading from third-party sites face higher risks, as Discisoft emphasized official channels only.
Next Steps
Discisoft plans a full audit and will release patched versions next week. Users should monitor for updates via the official site. For tips on secure software practices, check our guide on user engagement in safe digital environments.
Security experts advise checking file hashes against published values. Ongoing investigations by cybersecurity firms aim to trace the attackers. Discisoft offers support tickets for impacted customers.
The incident highlights persistent threats to desktop applications. As reliance on such tools grows, developers must prioritize integrity checks. NetworkUstad will update this story with new developments.