The Record (Recorded Future)
Hackers compromise Daemon Tools in global supply-chain attack, researchers say
ATT&CK techniques detected
T1195.002Compromise Software Supply Chain
69%
“hackers compromise daemon tools in global supply - chain attack, researchers say hackers compromise daemon tools in global supply - chain attack, researchers say hackers have compromised installers of widely - used disk imaging software in a supply chain attack that has affected …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
39%
“hackers compromise daemon tools in global supply - chain attack, researchers say hackers compromise daemon tools in global supply - chain attack, researchers say hackers have compromised installers of widely - used disk imaging software in a supply chain attack that has affected …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1072Software Deployment Tools
31%
“hackers compromise daemon tools in global supply - chain attack, researchers say hackers compromise daemon tools in global supply - chain attack, researchers say hackers have compromised installers of widely - used disk imaging software in a supply chain attack that has affected …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Researchers at Kaspersky said attackers tampered with installers for Daemon Tools — a popular program used to mount disk images as virtual drives — and distributed them through the software’s official website.