Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting
May 5, 2026
Critical Qualcomm Chipset Flaws Enable Remote Code Execution
May 5, 2026
Home/Threats/Google Ads Used to Weaponize PDF Editor with Tampered
Threats

Google Ads Used to Weaponize PDF Editor with Tampered

A potent malvertising campaign, first identified in September 2025, now poses a significant global threat. This operation specifically targets Windows users worldwide. Attackers created fake PDF...

Jennifer sherman
Jennifer sherman
January 20, 2026 2 Min Read
0 0

A potent malvertising campaign, first identified in September 2025, now poses a significant global threat. This operation specifically targets Windows users worldwide.

Attackers created fake PDF editing applications and promoted them through Google Ads to distribute a dangerous information-stealing malware called TamperedChef.

The malware targets users searching for appliance manuals and PDF editing tools online, exploiting common search behaviors to deliver silent infections across multiple industries and regions.

The campaign began officially on June 26, 2025, when threat actors registered multiple look-alike websites promoting a trojanized application named AppSuite PDF Editor.

Timeline of the TamperedChef campaign (Source - Sophos)
Timeline of the TamperedChef campaign (Source – Sophos)

Users believed they were downloading legitimate software, but the installer actually contained hidden malicious code designed to steal sensitive browser data.

What makes this attack particularly deceptive is its timing—the malware remained dormant for approximately 56 days, matching typical advertising campaign cycles.

This strategic delay allowed the malware to infect as many devices as possible before displaying harmful behavior.

Sophos analysts and researchers identified the malware after discovering over 100 affected customer systems during their managed detection and response operations.

Their investigation revealed that victims primarily came from Germany, the United Kingdom, and France, though the campaign affected at least 19 countries globally.

The attackers targeted industries relying on specialized equipment, where employees frequently search for product manuals online—a behavior the threat actors exploited systematically to spread their malicious installer.

The Silent Infection: How TamperedChef Operates

The infection mechanism of TamperedChef demonstrates sophisticated multi-stage deployment tactics designed to evade detection.

The TamperedChef attack chain (Source - Sophos)
The TamperedChef attack chain (Source – Sophos)

Users begin by clicking malicious advertisements appearing in search results on platforms like Google and Bing.

These ads direct them to deceptive websites such as fullpdf.com and pdftraining.com, where they download the Appsuite-PDF.msi installer.

Once executed, this file drops a setup executable called PDFEditorSetup.exe along with an obfuscated JavaScript file and an additional executable.

PDFEditorSetup.exe then silently establishes persistence by creating registry entries and Windows scheduled tasks, ensuring the malware survives system restarts.

Finally, the installer deploys PDF Editor.exe, the actual infostealer component, which awakened on August 21, 2025, to begin harvesting browser credentials, cookies, and autofill data.

The attackers further enhanced their operation by abusing legitimate code-signing certificates from Malaysian and US-registered entities, enabling their malicious files to bypass Windows SmartScreen protections and appear trustworthy to unsuspecting users.

This layered infection process showcases how modern threat actors combine malvertising, legitimate-looking software interfaces, and system-level evasion techniques to maximize infection success and minimize early detection.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Pulsar RAT Uses Memory-Only & HVNC Using Execution

Next Post

WhisperPair Attack Hijacks Laptops & Earbuds Allows Hijacking

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us