Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Beyond Compliance: The New Era of Smart Medical Device Software Integration

Android droppers now offer SMS steelers and spyware as well as banking Trojans

“Cannival” Solar Storm can paint over 18 US auroras that state this Labor Day

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » TamperedChef malware disguised as a fake PDF editor steals credentials and cookies
Identity

TamperedChef malware disguised as a fake PDF editor steals credentials and cookies

userBy userAugust 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 29, 2025Ravi LakshmananMalware/Windows Security

TamperedChef Malware

Cybersecurity researchers have discovered a cybercrime campaign that uses tricks to direct victims to fraudulent sites to provide a new information steeler called TamperedChef.

“The goal is to invite victims to download and install the Trojanized PDF editor, including information-stolen malware called TamperedChef.” “Malware is designed to harvest sensitive data such as credentials and web cookies.”

At the heart of the campaign is using several fake sites to promote a free PDF editor installer called AppSuite PDF Editor.

However, in the background, the setup program makes a secret request to an external server, drops the PDF editor program, and at the same time makes changes to the Windows registry to set up host persistence by verifying that the downloaded executable file will automatically start after a reboot. The registry key contains the -CM argument parameters to pass instructions to the binary.

Cybersecurity

Also, German cybersecurity company G Data, which analyzed the activity, said that various websites that provide these PDF editors download the same setup installer and download the PDF editor program from the server once the user accepts the license agreement.

“Next, we’ll run the main applications without discussion. This is equivalent to starting the -install routine,” said security researchers Karsten Hahn and Louis Solita. “We’ll also create an Autorun entry that provides command line arguments – CM = -FullUpDate running the following malicious application.”

The campaign is rated as being launched on June 26, 2025, when many of the counterfeit sites began registering or promoting their PDF editing software through at least five different Google Ads campaigns.

“In the beginning, the PDF appears to be working almost harmlessly, but the code includes steps to periodically check for potential updates to .JS files containing the -CM argument,” the researchers explained. “From August 21, 2025, the machine that recalled received instructions to enable a malicious feature called “TamperedChef” that is information stealing. ”

Once initialized, the Steeler will collect a list of installed security products and attempt to close the web browser to access sensitive data such as credentials and cookies.

Further analysis of malware-covered applications with G Data revealed that it acts as a backdoor and supports many features –

– Install, create a scheduled task named PDFEDITORSCHEDULEDTASK, and create a pdfeditoruscheduledtask that runs the application using the -cm=-partialUpdate and -cm=-backupupdate arguments. Delete two scheduled tasks – ping, communicating with command and control (C2) of actions to be performed on the system. This allows for malware downloads, data removal, and registry changes, among other things – checks, contacting C2 server configuration, read browser keys, set browsers, and run any commands and run any commands. Check with Chrome, OneLaunch, and Wave browsers, credentials, browser history, cookies, or settings custom search engines (reboot, same) and the ability to kill certain processes

Identity Security Risk Assessment

“Length since the start [ad] The malicious update is also 56 days, a campaign that is close to the 60-day length of a typical Google Ads campaign, suggesting that threat actors run ad campaigns, maximize downloads, and activate malicious features,” Truesec said.

This disclosure coincides with an analysis from Expel that details ads to ads ads that serve users ads that provide downloads of tools such as AppSuite, PDF Onestart, and PDF Editor. In some cases, these PDF programs are known to download other Trojanized apps or turn hosts into residential proxy without the consent of the user.

“The AppSuite PDF Editor is malicious,” says G Data. “This is a classic Trojan horse with a backdoor that is currently being downloaded at a large scale.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTrump administration deals are structured to prevent Intel from selling casting units
Next Article Invicta Water: Addresses PFAS Environmental Pollution
user
  • Website

Related Posts

Android droppers now offer SMS steelers and spyware as well as banking Trojans

September 1, 2025

WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More

September 1, 2025

Rethinking the security of scattered spiders

September 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Beyond Compliance: The New Era of Smart Medical Device Software Integration

Android droppers now offer SMS steelers and spyware as well as banking Trojans

“Cannival” Solar Storm can paint over 18 US auroras that state this Labor Day

Why Runways are focusing on the robot industry for future revenue growth

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beyond Compliance: The New Era of Smart Medical Device Software Integration

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.