Share This:

Cybersecurity Threat AdvisoryTamperedChef is an information‑stealing malware distributed through a trojanized PDF editing tool called AppSuite PDF Editor. The application is promoted using malicious websites and Google Ads, enticing users to download what appears to be a legitimate installer. Review this Cybersecurity Threat Advisory to learn more and protect your systems.

What is the threat?

Attackers are distributing a malicious PDF editor that installs the TamperedChef infostealer. The campaign uses Google Ads, SEO‑optimized sites, and fraudulently signed installers to present the application as legitimate (e.g., AppSuites PDF Editor or PDF Editor).

Initially, the tool behaves normally. Later, a remote update activates its malicious functions, which include:

  • Credential and cookie theft
  • Browser data extraction via DPAPI
  • Execution of arbitrary commands

Investigators have linked more than 50 domains and multiple fake code‑signing certificates to this operation, indicating a coordinated and large‑scale effort.

Why is it noteworthy?

This campaign is notable for its:

  • Scale and distribution tactics: Google Ads and SEO boost reach and credibility.
  • Delayed activation: Malicious components were enabled weeks after installation, aligning with the typical 60‑day Google Ads campaign duration to avoid early detection.
  • Use of legitimate‑looking signatures: At least four companies’ certificates were abused to sign the malware.
  • Expanded ecosystem: Related applications have reportedly enrolled infected systems into residential proxy networks, showing a broader monetization strategy.

Though some apps appear to be potentially unwanted programs (PUPs), their behavior aligns with full‑scale malware.

What is the exposure or risk?

Organizations face several risks, including:

  • Theft of credentials, cookies, and browser data
  • Unauthorized command execution
  • Enrollment of devices into proxy networks
  • Persistent compromise through scheduled tasks and Run‑key entries

Any device that installed AppSuites PDF Editor, PDF Editor, OneStart, or ManualFinder may have already received malicious updates. Once active, TamperedChef terminates browser processes to access protected files, communicates externally for updates and commands, and can execute attacker‑controlled actions.

What are the recommendations?

Barracuda recommends the following actions to reduce exposure and prevent compromise:

  • Avoid downloading software from ads, pop‑ups, or untrusted sites.
  • Restrict installation of unverified or unsigned applications.
  • Filter malicious domains and inspect suspicious outbound traffic.
  • Enforce DNS filtering and safe browsing protections.
  • Apply least‑privilege access across all user accounts.
  • Require MFA for critical systems and remote access.
  • Audit and limit local administrator permissions.
  • Maintain offline, immutable backups of critical data.
  • Educate users on malvertising and deceptive installers.
  • Reinforce cautious behavior around “free” utilities.

References

For more in-depth information about the recommendations, please visit the following links:

If you have any questions about this Cybersecurity Threat Advisory, don’t hesitate to get in touch with Barracuda Managed XDR’s Security Operations Center.


Share This:
Sachet Karkera

Posted by Sachet Karkera

Sachet is a Cybersecurity Analyst at Barracuda. He's a security expert, working on our Blue Team within our Security Operations Center. Sachet supports our XDR service delivery and is highly skilled at analyzing security events to detect cyber threats, helping keep our partners and their customers protected.

Leave a reply

Your email address will not be published. Required fields are marked *

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.