Raleigh, NC

32°F
Broken Clouds Humidity: 72%
Wind: 4.12 M/S

TamperedChef Malware Spreads via Malvertising Deception

TamperedChef Malware Spreads via Malvertising Deception

A global malvertising campaign, dubbed TamperedChef, is actively leveraging bogus installers that impersonate popular software to trick users into installing malware. The goal of these attacks is to establish persistence and deploy JavaScript malware that facilitates remote access and control.

Industrialized Social Engineering

The operators behind TamperedChef rely heavily on social engineering, malvertising, and Search Engine Optimization (SEO) to lure victims. They use the names of everyday applications and product manuals to catch users searching on engines like Bing. Malicious ads

or poisoned URLs direct users to booby trapped domains registered on platforms like NameCheap, deceiving them into downloading counterfeit installers.

To give these fake applications a veneer of legitimacy, the threat actors use abused digital certificates issued to shell companies registered across the globe. As older certificates are revoked, the operators quickly acquire new ones under different company names. Acronis Threat Research Unit (TRU) described the infrastructure as "industrialized," designed to continuously churn out new certificates and exploit the inherent trust associated with signed applications.

Infection Chain and Payloads

A typical attack begins when a user searches for software, such as a PDF editor. Clicking a malicious ad leads them to a deceptive site. Upon executing the installer, the user is prompted to agree to licensing terms, and a "thank you" message is displayed in a new browser tab to maintain the ruse.

In the background, an XML file is dropped to create a scheduled task. This task is designed to launch an obfuscated JavaScript backdoor. The backdoor connects to an external server and sends basic machine metadata, encrypted and Base64 encoded over HTTPS.

While the campaign's ultimate goal remains unclear, researchers suggest it may involve facilitating advertising fraud, harvesting sensitive data for underground sale, or monetizing access to other cybercriminals.

Telemetry data shows a significant concentration of infections in the U.S., Israel, Spain, Germany, India, and Ireland. Healthcare, construction, and manufacturing are the most affected sectors, likely due to their reliance on highly specialized equipment, which prompts employees to search online for product manuals a behavior exploited by the TamperedChef campaign.

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.