New “TamperedChef campaign” Uses Fake Installers to Target Global Users

Related

10 CISOs to Watch in Washington

Washington remains a center of cybersecurity leadership. Federal agencies,...

10 CISOs to Watch in Memphis

Memphis has a growing cybersecurity scene. The city’s mix...

10 CISOs to Watch in San Antonio

San Antonio has grown into one of the strongest...

10 CISOs to Watch in Houston

Houston is one of the most active cybersecurity hubs...

Share

What happened

Security researchers at Acronis Threat Research Unit (TRU) uncovered an ongoing global campaign dubbed “TamperedChef” in which cyber-actors distribute fake software installers laced with a backdoor and “information-stealer” malware. 

The installers masquerade as legitimate utilities and are signed using abused code-signing certificates issued to shell companies, allowing them to appear trustworthy and bypass security detection. 

Who is affected

  • End-users globally who download applications such as PDF editors or product manual software via search results or via advertised/poisoned URLs.
  • Organizations in sectors including healthcare, construction, and manufacturing are particularly affected, according to telemetry data showing higher infection rates in those industries.
  • Geographic regions with notable infection telemetry include the U.S., Israel, Spain, Germany, India, and Ireland.

Why CISOs should care

  • The campaign uses social engineering via SEO and malvertising to trick users into downloading malicious software that may bypass traditional perimeter defenses.
  • Once installed, the malware establishes persistence via scheduled tasks and obfuscated JavaScript.
  • Compromised devices may exfiltrate system metadata or enable remote access, posing a risk of data breaches, fraud, or the deployment of additional malicious payloads.

3 Practical Actions for CISOs

  1. Validate software installers and certificate chains. Enforce code-signing verification policies and ensure that installers originate from trusted sources. Implement allow-listing where feasible.
  2. Educate users on risks of malvertising and fake downloads. Run awareness campaigns highlighting the dangers of downloading tools from search ads or unverified sites, especially for specialized software.
  3. Monitor endpoints for signs of scheduled task creation and unusual JavaScript execution. Deploy endpoint detection & response (EDR) tools and regularly review executed tasks/scripts for anomalies.