Researchers at Unit 42 have detailed ongoing campaigns involving TamperedChef-style malware, a sophisticated threat that disguises itself as legitimate productivity software. Distributed primarily through malvertising, these trojanized applications evade detection by remaining dormant for weeks or months. Once active, they function as a downloader for more dangerous payloads, such as information stealers and remote access trojans (RATs). The malware employs tactics traditionally seen in Potentially Unwanted Programs (PUPs), including deceptive EULAs, but its capabilities for stealth, persistence, and remote command execution place it firmly in the malware category. Unit 42 has tracked over 4,000 samples across three distinct activity clusters, highlighting a significant and evolving threat that leverages social engineering and technical evasion to compromise victims.
TamperedChef (also known as EvilAI) represents a style of attack rather than a single threat group. The core of the campaign involves creating trojanized versions of common productivity tools like PDF editors, calendar apps, and file converters. These malicious applications are promoted through aggressive malvertising campaigns that redirect users to professionally designed websites hosting the downloads.
The malware is engineered for stealth and longevity. Unlike typical adware that is immediately noisy, TamperedChef applications often provide the advertised functionality and remain dormant for an extended period. This long incubation period allows the software to bypass initial security checks and lulls the victim into a false sense of security. After this dormant phase, the malware initiates contact with a command and control (C2) server to receive instructions and download additional malicious payloads. This capability transforms the seemingly harmless application into a dangerous backdoor for attackers, enabling them to steal credentials, deploy ransomware, or use the victim's machine as a proxy.
Unit 42 has identified three major clusters of this activity, tracked as CL-CRI-1089, CL-UNK-1090, and CL-UNK-1110. The operators use deceptive EULAs and legitimate-looking websites, such as crystalpdf.com, to add a veneer of legitimacy and legally protect their questionable activities. However, the ability to remotely execute commands and deploy malware without user consent firmly categorizes TamperedChef as a malicious threat, not just an aggressive PUP.
The operators behind TamperedChef employ a combination of social engineering and technical evasion to succeed.
Initial Access and Distribution:
T1566.001 - Phishing: Spearphishing Link): The primary infection vector is malicious advertising that pushes users toward attacker-controlled websites.T1204.002 - Malicious Link): The user is tricked into downloading and running the trojanized productivity application, believing it to be legitimate software.Defense Evasion and Persistence:
T1497 - Virtualization/Sandbox Evasion): The application checks for signs of a virtualized or analysis environment before activating.T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder): The malware establishes persistence through common autostart mechanisms to ensure it runs after a reboot.Command and Control & Payload Delivery:
T1071.001 - Application Layer Protocol: Web Protocols): Once active, the malware communicates with a C2 server over standard web protocols (HTTP/HTTPS) to blend in with normal network traffic.T1105 - Ingress Tool Transfer): The primary function after activation is to download and execute secondary payloads. These can include:This behavior indicates that the operators may be diversifying their revenue streams, acting as initial access brokers for other threat actors.
The impact of a TamperedChef infection can be severe. Initially, the impact may seem low, resembling that of adware. However, the true danger lies in the payload delivery capability. A successful infection can lead to:
Because the malware remains dormant for so long, it is extremely difficult for victims and security teams to trace the initial source of the compromise, complicating incident response and remediation efforts.
No specific file hashes or IP addresses were provided in the source article. The following domain was mentioned as an example of a distribution site:
crystalpdf.comSecurity teams may want to hunt for the following patterns that could indicate TamperedChef-style activity:
pdf-editor-*.exe, zip-converter-*.exe%APPDATA%\<random_name>\Detecting TamperedChef requires a multi-layered approach that goes beyond traditional antivirus signatures.
Mitigating the risk of TamperedChef requires a combination of technical controls and user awareness.
Use application control technologies, such as application whitelisting, to prevent the execution of unauthorized and trojanized software.
Train users to identify and report phishing and malvertising attempts, and to only download software from trusted, official sources.
Implement egress filtering to block outbound connections to known malicious or untrusted domains, preventing C2 communication and payload download.
Use endpoint protection solutions to scan downloads and detect known malicious files and behaviors associated with TamperedChef.
Run untrusted applications, such as those downloaded from the internet, in a sandboxed environment to limit their access to the host system.
To counter threats like TamperedChef, which rely on users executing a trojanized application, implementing executable allowlisting is a highly effective control. This technique, also known as application control, ensures that only approved and vetted applications can run on an endpoint. For TamperedChef, this would prevent the initial execution of the malicious PDF editor or file converter downloaded from a malvertising link. Security teams should start by creating an inventory of all legitimate software required for business operations. This baseline can then be used to create a 'deny-by-default' policy on user workstations. While initial deployment can be resource-intensive, the security benefits are substantial. Modern EDR solutions and operating systems like Windows offer built-in application control features (e.g., AppLocker, Windows Defender Application Control) that can be deployed in an audit-only mode first to identify necessary applications without disrupting workflow, before moving to full enforcement.
Given TamperedChef's reliance on C2 communication to download secondary payloads, Network Traffic Analysis (NTA) is critical for detection. The malware's long dormancy period provides a unique opportunity for detection: a process that has been inactive for months suddenly making outbound connections is a strong anomaly. Security teams should use tools that can baseline normal network behavior for endpoints and alert on deviations. Specifically, monitor for processes associated with productivity tools making connections to newly observed domains, non-standard ports, or IP addresses with poor reputations. Implementing SSL/TLS inspection (where appropriate) is crucial, as C2 traffic is almost always encrypted. An NTA solution can help identify the heartbeat C2 traffic or the larger data transfers associated with payload downloads, providing an opportunity to isolate the infected host before a more damaging payload like a RAT or infostealer is successfully deployed.
Dynamic analysis in an automated sandbox is essential for vetting suspicious files like the installers used by TamperedChef. Since the malware is known to employ time-based evasion (long dormancy), the sandbox environment must be configured to accommodate this. This may involve 'time-warping' capabilities that accelerate the system clock within the sandbox to trigger time-based logic. The analysis should focus on monitoring for key behaviors: creation of persistence mechanisms (e.g., registry run keys), attempts to enumerate sandbox artifacts, and any outbound network connections. Even if the full payload isn't delivered due to sandbox detection, the initial C2 beaconing attempt can provide valuable IOCs (domains, IPs) that can be fed into other security tools like firewalls and web filters. This allows security teams to proactively block the threat even if the malware successfully evades full detonation within the sandbox.
First TamperedChef-style malware campaigns were identified.
Unit 42 observed a sharp increase in information stealer incidents originating from similar software.
Earliest evidence suggests some TamperedChef applications have been in the wild since this time.
Widespread installation of TamperedChef-style applications begins.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.