Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Emergency patches are now available for FreePBX server targeting zero-day defects

UK offshore winds face bottlenecks threatening targets for 2030

Google warns that SalesLoft Oauth breaches will extend beyond Salesforce and affect all integrations

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » TamperedChef malware disguised as a fake PDF editor steals credentials and cookies
Identity

TamperedChef malware disguised as a fake PDF editor steals credentials and cookies

userBy userAugust 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 29, 2025Ravi LakshmananMalware/Windows Security

TamperedChef Malware

Cybersecurity researchers have discovered a cybercrime campaign that uses tricks to direct victims to fraudulent sites to provide a new information steeler called TamperedChef.

“The goal is to invite victims to download and install the Trojanized PDF editor, including information-stolen malware called TamperedChef.” “Malware is designed to harvest sensitive data such as credentials and web cookies.”

At the heart of the campaign is using several fake sites to promote a free PDF editor installer called AppSuite PDF Editor.

However, in the background, the setup program makes a secret request to an external server, drops the PDF editor program, and at the same time makes changes to the Windows registry to set up host persistence by verifying that the downloaded executable file will automatically start after a reboot. The registry key contains the -CM argument parameters to pass instructions to the binary.

Cybersecurity

Also, German cybersecurity company G Data, which analyzed the activity, said that various websites that provide these PDF editors download the same setup installer and download the PDF editor program from the server once the user accepts the license agreement.

“Next, we’ll run the main applications without discussion. This is equivalent to starting the -install routine,” said security researchers Karsten Hahn and Louis Solita. “We’ll also create an Autorun entry that provides command line arguments – CM = -FullUpDate running the following malicious application.”

The campaign is rated as being launched on June 26, 2025, when many of the counterfeit sites began registering or promoting their PDF editing software through at least five different Google Ads campaigns.

“In the beginning, the PDF appears to be working almost harmlessly, but the code includes steps to periodically check for potential updates to .JS files containing the -CM argument,” the researchers explained. “From August 21, 2025, the machine that recalled received instructions to enable a malicious feature called “TamperedChef” that is information stealing. ”

Once initialized, the Steeler will collect a list of installed security products and attempt to close the web browser to access sensitive data such as credentials and cookies.

Further analysis of malware-covered applications with G Data revealed that it acts as a backdoor and supports many features –

– Install, create a scheduled task named PDFEDITORSCHEDULEDTASK, and create a pdfeditoruscheduledtask that runs the application using the -cm=-partialUpdate and -cm=-backupupdate arguments. Delete two scheduled tasks – ping, communicating with command and control (C2) of actions to be performed on the system. This allows for malware downloads, data removal, and registry changes, among other things – checks, contacting C2 server configuration, read browser keys, set browsers, and run any commands and run any commands. Check with Chrome, OneLaunch, and Wave browsers, credentials, browser history, cookies, or settings custom search engines (reboot, same) and the ability to kill certain processes

Identity Security Risk Assessment

“Length since the start [ad] The malicious update is also 56 days, a campaign that is close to the 60-day length of a typical Google Ads campaign, suggesting that threat actors run ad campaigns, maximize downloads, and activate malicious features,” Truesec said.

This disclosure coincides with an analysis from Expel that details ads to ads ads that serve users ads that provide downloads of tools such as AppSuite, PDF Onestart, and PDF Editor. In some cases, these PDF programs are known to download other Trojanized apps or turn hosts into residential proxy without the consent of the user.

“The AppSuite PDF Editor is malicious,” says G Data. “This is a classic Trojan horse with a backdoor that is currently being downloaded at a large scale.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHumanity users face new choices – opt out or share your chat for AI training
Next Article Invicta Water: Addresses PFAS Environmental Pollution
user
  • Website

Related Posts

Emergency patches are now available for FreePBX server targeting zero-day defects

August 29, 2025

Google warns that SalesLoft Oauth breaches will extend beyond Salesforce and affect all integrations

August 29, 2025

Researchers find code flaws and code flaws that allow attackers to reissue deleted extensions with the same name

August 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Emergency patches are now available for FreePBX server targeting zero-day defects

UK offshore winds face bottlenecks threatening targets for 2030

Google warns that SalesLoft Oauth breaches will extend beyond Salesforce and affect all integrations

Invicta Water: Addresses PFAS Environmental Pollution

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.