Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack
Summary
Ars Technica reports a monthlong supply-chain compromise of Daemon Tools, distributing signed Windows installers that deliver a data-collection payload and, in some cases, a more capable backdoor (QUIC RAT). The attack affected thousands of machines across 100+ countries and demonstrates evolving supply-chain risks and targeted follow-on payloads; defenders are advised to scan systems and monitor for suspicious process injections.