> Back to All Posts

TamperedChef Infostealer Hides in Fake PDF Editing App

TamperedChef infostealer

The TamperedChef infostealer has emerged as a serious threat, hiding inside a fraudulent PDF editor promoted through Google Ads. This deceptive campaign tricked users into downloading an app that appeared legitimate, only to later activate malicious features. With delayed activation and credential theft, the campaign shows how cybercriminals continue to evolve their tactics.

Malvertising and the Fake PDF Tool

Attackers distributed TamperedChef using AppSuite PDF Editor, a fraudulent application pushed through malicious ads. The app seemed functional at first, offering basic PDF editing features. This design lulled victims into trusting it while the malware quietly prepared to strike.

Researchers traced the campaign to over 50 domains and several Google Ads campaigns. The widespread reach increased the chances of unsuspecting users downloading the infected program.

Delayed Activation Tactics

One of TamperedChef’s most dangerous traits is its delayed activation. Although VirusTotal flagged the app as suspicious months earlier, the infostealer remained dormant until August 21, 2025.

This approach ensured the malware bypassed early detection and avoided immediate takedowns. By waiting until near the end of ad campaigns, the attackers maximized infections before security researchers reacted.

How TamperedChef Works

Once active, TamperedChef targeted browser data and credentials. It decrypted sensitive information using Windows’ Data Protection API (DPAPI) and checked systems for security tools. This careful design allowed the malware to gather data while avoiding detection.

The malware was deployed using the program’s -fullupdate argument, which secretly installed the infostealer payload. Signed certificates from several companies gave the tool additional credibility before revocation.

Linked Tools and Broader Campaign

Investigators connected TamperedChef’s operators to other suspicious software, including OneStart and EpiBrowser. These applications often appeared legitimate but were flagged as potentially unwanted programs. Some may have been used to turn infected systems into residential proxies, further aiding cybercriminal operations.

Defensive Measures

Although code-signing certificates used in the campaign have been revoked, previously downloaded versions remain dangerous. Security teams should review the indicators of compromise (IoCs) released by Truesec and Expel.

Organizations should also monitor ad-based downloads and enforce stricter software vetting processes. Preventing malvertising-based infections requires vigilance across both user behavior and enterprise defenses.

Final Thoughts

The TamperedChef infostealer demonstrates how cybercriminals exploit trust through fake applications and clever timing. By blending functionality with hidden threats, attackers gained access to sensitive browser data while evading detection. The campaign is a reminder that even familiar tools, like PDF editors, can conceal major risks. Staying alert, applying IoCs, and verifying downloads remain critical in defending against evolving malware threats.

 

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.