Malvertising Campaign Uses Google Ads to Distribute TamperedChef Malware

Related

Cybersecurity Leaders to Watch: Louisiana Healthcare

Louisiana’s healthcare sector depends on cybersecurity leaders who can...

Anthropic Unveils Claude Mythos to Find Critical Software Flaws Before Attackers Do

What happened Anthropic unveiled Claude Mythos Preview as the model...

Microsoft Commits $10 Billion to Expand AI and Cybersecurity Infrastructure in Japan

What happened Microsoft announced a $10 billion investment to expand...

Share

What happened

Threat actors used Google Ads malvertising to distribute a counterfeit Appsuite PDF Editor installer bundled with the TamperedChef infostealer. Beginning in mid-2025, malicious ads targeting users searching for appliance manuals and PDF tools redirected victims to deceptive sites hosting the trojanized installer. Once executed, the installer created persistence via registry entries and scheduled tasks, and then deployed a stealthy infostealing component that harvested browser credentials, cookies, and autofill data. The actors also abused legitimate code-signing certificates to evade Windows SmartScreen protections, increasing the installer’s perceived legitimacy. Sophos researchers identified over 100 infected systems across at least 19 countries, including Germany, the UK, and France. S

Who is affected

Windows users worldwide who download software promoted through search ads, especially in sectors where manual and PDF tools are frequently sought, face indirect exposure via deceptive advertising channels.

Why CISOs should care

Malvertising campaigns leveraging trusted platforms can bypass perimeter controls and deliver malware through familiar user flows, elevating the risk of credential theft and unauthorized access.

3 practical actions

  • Review advertising exposure: Assess and block malicious third-party ad campaigns affecting your user base.
  • Educate staff on download sources: Discourage installing software from unverified sites or ads.
  • Harden endpoint protections: Detect persistence mechanisms and credential theft indicators early.