New “TamperedChef campaign” Uses Fake Installers to Target Global Users

Related

Cybersecurity Leaders to Watch: Louisiana Healthcare

Louisiana’s healthcare sector depends on cybersecurity leaders who can...

Anthropic Unveils Claude Mythos to Find Critical Software Flaws Before Attackers Do

What happened Anthropic unveiled Claude Mythos Preview as the model...

Microsoft Commits $10 Billion to Expand AI and Cybersecurity Infrastructure in Japan

What happened Microsoft announced a $10 billion investment to expand...

Share

What happened

Security researchers at Acronis Threat Research Unit (TRU) uncovered an ongoing global campaign dubbed “TamperedChef” in which cyber-actors distribute fake software installers laced with a backdoor and “information-stealer” malware. 

The installers masquerade as legitimate utilities and are signed using abused code-signing certificates issued to shell companies, allowing them to appear trustworthy and bypass security detection. 

Who is affected

  • End-users globally who download applications such as PDF editors or product manual software via search results or via advertised/poisoned URLs.
  • Organizations in sectors including healthcare, construction, and manufacturing are particularly affected, according to telemetry data showing higher infection rates in those industries.
  • Geographic regions with notable infection telemetry include the U.S., Israel, Spain, Germany, India, and Ireland.

Why CISOs should care

  • The campaign uses social engineering via SEO and malvertising to trick users into downloading malicious software that may bypass traditional perimeter defenses.
  • Once installed, the malware establishes persistence via scheduled tasks and obfuscated JavaScript.
  • Compromised devices may exfiltrate system metadata or enable remote access, posing a risk of data breaches, fraud, or the deployment of additional malicious payloads.

3 Practical Actions for CISOs

  1. Validate software installers and certificate chains. Enforce code-signing verification policies and ensure that installers originate from trusted sources. Implement allow-listing where feasible.
  2. Educate users on risks of malvertising and fake downloads. Run awareness campaigns highlighting the dangers of downloading tools from search ads or unverified sites, especially for specialized software.
  3. Monitor endpoints for signs of scheduled task creation and unusual JavaScript execution. Deploy endpoint detection & response (EDR) tools and regularly review executed tasks/scripts for anomalies.