{"@type":"StructuredNewsArticle","access":{"license":"neupai_standard","structured_data":"free","full_text_access":null,"full_text_available":false,"attribution_required":true},"content":{"claims":[{"id":"c1","type":"fact","as_of":"2026-05-05","figures":null,"insight":null,"as_of_raw":"disclosed on May 5","statement":"The DAEMON Tools supply chain attack went undetected for about a month","comparison":null,"expiry_hint":null,"source_type":"company_disclosure","as_of_explicit":false},{"id":"c2","type":"fact","as_of":"2026-04-08","figures":null,"insight":null,"as_of_raw":"starting April 8","statement":"Infected installation files were distributed through the official DAEMON Tools website starting April 8","comparison":null,"expiry_hint":null,"source_type":"company_disclosure","as_of_explicit":true},{"id":"c3","type":"fact","as_of":"2026-05","figures":null,"insight":null,"as_of_raw":"this year","statement":"The damage led to thousands of infection attempts in over 100 countries","comparison":null,"expiry_hint":null,"source_type":"company_disclosure","as_of_explicit":false},{"id":"c4","type":"fact","as_of":"2026-05","figures":null,"insight":null,"as_of_raw":"this year","statement":"The infected versions range from 12.5.0.2421 to 12.5.0.2434","comparison":null,"expiry_hint":null,"source_type":"company_disclosure","as_of_explicit":false},{"id":"c5","type":"fact","as_of":"2026-05","figures":null,"insight":null,"as_of_raw":"this year","statement":"Actual installation of secondary malicious files occurred on only about 12 systems at government agencies, scientific research institutes, manufacturers, and distributors in Russia, Belarus, and Thailand","comparison":null,"expiry_hint":null,"source_type":"company_disclosure","as_of_explicit":false},{"id":"c6","type":"fact","as_of":"2026","figures":null,"insight":null,"as_of_raw":"this year","statement":"This is the fourth supply chain attack case this year, following eScan (January), Notepad++ (February), and CPU-Z (April)","comparison":null,"expiry_hint":null,"source_type":"company_disclosure","as_of_explicit":true}],"topics":["cybersecurity","malware","supply chain attack"],"summary":"Kaspersky announced that thousands of devices in 100 countries were infected through a DAEMON Tools supply chain attack. Infected installation files were distributed starting April 8, and users are advised to immediately delete them.","entities":[{"name":"Kaspersky","type":"company","metadata":{"parent":null,"ticker":null},"canonical_id":"corp:ru:kaspersky","role_in_article":"source"},{"name":"DAEMON Tools","type":"product","metadata":{"parent":null,"ticker":null},"canonical_id":"product:xx:noti-ks","role_in_article":"primary_subject"},{"name":"AVB Disk Soft","type":"company","metadata":{"parent":null,"ticker":null},"canonical_id":"corp:xx:avb-nbc-bitk","role_in_article":"parent_company"}],"headline":"Kaspersky Reveals \"DAEMON Tools Supply Chain Hack\"...Thousands Infected in 100 Countries, Recommends Deletion","geography":["KR","RU","BY","TH","CN"],"ai_emotional_context":{"arousal":0,"valence":0,"primary_emotions":[],"emotional_triggers":[],"secondary_emotions":[]}},"@context":"https://neupai.io/schema/v0.2","identity":{"ai_url":null,"author":"버트","language":"en","publisher":{"name":"테크42","type":"online","domain":"tech42.co.kr"},"article_id":"tech42_20260506_daemon-tools-supply-chain-hack","updated_at":null,"originality":"self_produced","article_type":"straight_news","published_at":"2026-05-06T00:13:45.000Z","canonical_url":"https://www.tech42.co.kr/%ec%b9%b4%ec%8a%a4%ed%8d%bc%ec%8a%a4%ed%82%a4-%eb%8d%b0%eb%aa%ac-%ed%88%b4%ec%a6%88-%ea%b3%b5%ea%b8%89%eb%a7%9d-%ed%95%b4%ed%82%b9-%ea%b3%b5%ea%b0%9c100%ea%b0%9c%ea%b5%ad-%ec%88%98/?utm_source=rss&utm_medium=rss&utm_campaign=%25ec%25b9%25b4%25ec%258a%25a4%25ed%258d%25bc%25ec%258a%25a4%25ed%2582%25a4-%25eb%258d%25b0%25eb%25aa%25ac-%25ed%2588%25b4%25ec%25a6%2588-%25ea%25b3%25b5%25ea%25b8%2589%25eb%25a7%259d-%25ed%2595%25b4%25ed%2582%25b9-%25ea%25b3%25b5%25ea%25b0%259c100%25ea%25b0%259c%25ea%25b5%25ad-%25ec%2588%2598"},"temporal":{"freshness":"recent","next_update_expected":null},"provenance":{"source_chain":["primary_reporting"],"related_articles":[],"original_source_url":null}}