TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

The Hacker News
Actively Exploited

Overview

The TamperedChef malware campaign exploits fake software installers to distribute JavaScript malware, enabling remote access and control of infected systems. This ongoing global threat poses significant risks to users who may unknowingly install these malicious applications.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Action Required: Users should avoid downloading software from unverified sources and ensure that their security software is up to date to detect and block malicious installations.
  • Timeline: Ongoing since the report's release

Original Article Summary

Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef. The end goal of the attacks is to establish persistence and deliver JavaScript malware that facilitates remote access and control, per a new report from Acronis Threat Research Unit (TRU). The campaign, per the

Impact

Not specified

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Ongoing since the report's release

Remediation

Users should avoid downloading software from unverified sources and ensure that their security software is up to date to detect and block malicious installations.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Malware.

Related Coverage

Global Agencies Release New Guidance to Secure Industrial Networks

Infosecurity Magazine

The Cybersecurity and Infrastructure Security Agency (CISA), the UK's National Cyber Security Centre (NCSC), and the FBI have issued new guidance aimed at improving security for Operational Technology (OT) environments. This guidance comes in response to the increasing number of cyber threats targeting critical infrastructure, which often relies on OT systems. These systems manage physical processes in industries such as manufacturing, energy, and transportation. The agencies emphasize the need for organizations to adopt better security measures, including risk assessments and incident response strategies, to defend against potential cyberattacks. This initiative is crucial as vulnerabilities in OT can have severe consequences, affecting not only the organizations themselves but also public safety and national security.

Jan 15, 2026

CodeBuild Flaw Put AWS Console Supply Chain At Risk

Infosecurity Magazine

A misconfiguration in AWS CodeBuild has left key repositories vulnerable to potential attacks. This flaw could allow unauthorized access to sensitive data stored within those repositories, posing a significant risk to companies relying on AWS for their software development and deployment processes. Developers and organizations using AWS CodeBuild should be aware of this vulnerability and take immediate action to secure their environments. The issue emphasizes the need for stringent security practices, especially in cloud-based development tools. As this misconfiguration could impact a wide range of users, timely remediation is essential to prevent exploitation.

Jan 15, 2026

Cyber Threat Actors Ramp Up Attacks on Industrial Environments

Infosecurity Magazine

A recent report from Cyble reveals that hacktivists and cybercriminals are increasingly targeting industrial systems, looking to exploit vulnerabilities within these environments. This uptick in attacks poses significant risks to companies operating in sectors such as manufacturing, energy, and utilities, potentially leading to disruptions in operations and financial losses. The report emphasizes the critical need for these organizations to enhance their cybersecurity measures and patch known vulnerabilities to safeguard their systems. As attackers become more sophisticated, the potential for severe consequences, including data breaches and operational downtime, grows. Companies must prioritize security protocols to protect their infrastructure from these escalating threats.

Jan 15, 2026

Your Windows PC needs this patch to ward off nasty bootkit malware - update now

Latest news

The January Patch Tuesday updates for Windows include important changes to Secure Boot, which safeguards computers against bootkit malware. Secure Boot is a security feature that ensures only trusted software is loaded during the startup process. The updates address expiring certificates that could compromise this protection if not renewed. Users and IT administrators are urged to install these patches promptly to mitigate the risk of bootkit attacks, which can allow malicious software to take control of a system before the operating system loads. Keeping Secure Boot updated is crucial for maintaining the integrity and security of Windows PCs.

Jan 15, 2026

The quiet way AI normalizes foreign influence

CyberScoop

The article discusses how AI-generated information is shaping public perception in the U.S., particularly in terms of trusting sources. It points out that while users are becoming accustomed to relying on citations provided by AI, the algorithms do not prioritize credible sources; instead, they favor information that is widely accessible. This can inadvertently normalize foreign influence, as users may not critically assess the origins of the information they receive. The implications are significant, especially as misinformation can spread more easily through AI, potentially impacting public opinion and decision-making processes. The article raises concerns about the need for users to remain vigilant and discerning about the information they consume from AI-generated content.

Jan 15, 2026

PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)

Help Net Security

A serious vulnerability, identified as CVE-2025-64155, has been discovered in Fortinet’s FortiSIEM security platform, allowing unauthenticated remote attackers to execute unauthorized code. This flaw specifically affects the phMonitor service, which is crucial for the operation of FortiSIEM. The release of proof-of-concept (PoC) exploit code has heightened concerns, urging organizations using this software to apply patches immediately. If not addressed, this vulnerability could lead to significant security risks, as attackers could manipulate the system remotely. Organizations should prioritize patching their FortiSIEM deployments to safeguard against potential exploitation.

Jan 15, 2026