Sneaky Malware Hides Inside Signed Productivity Apps: What to Do
A new malware campaign called TamperedChef takes advantage of a simple fact: most people trust apps with a valid digital signature. The attackers sign malicious installers using stolen or forged certificates, making them look like legitimate productivity tools—Microsoft Teams, Slack, or Zoom. Once installed, the software drops infostealers and remote access trojans (RATs) instead of the promised app.
If you use any of these tools at work or home, it helps to understand how the trick works and what you can do to avoid it.
What Is TamperedChef and How Does It Work?
TamperedChef is not a single piece of malware but a distribution method. According to security researchers who reported on the campaign (including cyberpress.org and gbhackers.com), the attackers package malware inside installers that have been code-signed. A digital signature is meant to confirm the publisher’s identity and that the file hasn’t been tampered with. In this case, the signatures are either stolen from legitimate developers or forged. When a user sees “Verified publisher” in Windows, the installer appears harmless.
The payloads reported so far include ValleyRAT and other families of infostealers and RATs. ValleyRAT gives the attacker full remote control, while infostealers quietly grab saved passwords, browser cookies, and cryptocurrency wallets.
Why Signed Apps Are Exploited for Malware Delivery
Trust in digital signatures is deeply baked into Windows security. Many organizations allow only signed software to run. Antivirus tools also rely partly on signature reputation. If a signature passes initial checks, the file is often given a green light—or at least not flagged as malicious.
TamperedChef exploits that assumption. The certificates used may be valid but obtained through dishonest means. The exact method (stolen private keys, leaked signing infrastructure, or abuse of certificate authorities) has not been fully detailed by researchers at this writing. What is known is that the signatures are real enough to bypass Windows SmartScreen and some endpoint protections.
Known Examples: Fake Microsoft Teams Downloads
The most visible attack vector so far is fake Microsoft Teams installers. Researchers at CyberSecurityNews and others documented multiple sites offering “Teams Update” or “Teams Pro” downloads. These pages look like official Microsoft sites but are not. The downloaded .msi or .exe file is signed, but with a certificate that traces back to an entity unrelated to Microsoft.
Once installed, the user sees a normal Teams setup screen while the malicious code quietly runs in the background. In some cases, the real Teams app is even installed alongside the malware to maintain the illusion.
How to Protect Yourself
You don’t need to become a security expert, but a few habits can make a real difference.
Download only from official stores or company portals. Microsoft Teams should come from microsoft.com or from your IT department’s approved installer. The same goes for Slack, Zoom, and Google Meet. Avoid third-party download sites, even if they appear in search results.
Check the publisher name before running an installer. In Windows, right-click the file, go to Properties → Digital Signatures. The signer should match the legitimate company. For Microsoft Teams, the signer should be “Microsoft Corporation.” If it says anything else—or “Unknown”—do not run it.
Look at the file source. If a friend or coworker sends you a link to a productivity app installer, verify they intended to send it. Many TamperedChef infections start with phishing emails or social engineering messages.
Keep endpoint protection updated. While no tool is perfect, a good antivirus or EDR solution can sometimes catch anomalies even in signed files. Enable real-time scanning and let it run.
Be cautious with permissions. If the installer asks for unusual permissions (like “access your browser data” or “scan your hard drive”) that have nothing to do with the app, cancel the installation.
If You Suspect You’ve Been Infected
Signs of infection include unexpected system slowdowns, new processes in Task Manager, unknown network connections, or your browser redirecting to unfamiliar sites. If you suspect TamperedChef or any malware:
- Disconnect from the internet immediately (disable Wi-Fi or unplug the cable).
- Run a full scan with a reputable security tool—Windows Defender offline scan is a good starting point.
- Change passwords for important accounts (email, banking, work systems) from a known-clean device.
- If you have credentials saved in the browser, assume they could be compromised and reset them.
For deeper cleanup, you may need to reinstall the operating system. That sounds drastic, but malware that runs as a signed installer can embed itself deeply enough that simple removal tools miss it.
Sources
- CyberSecurityNews: TamperedChef Malware Uses Signed Productivity Apps to Deliver Stealers and RATs
- gbhackers.com: TamperedChef Malware Hides in Signed Apps to Drop Stealers and RATs
- cyberpress.org: Cybercriminals Abuse Microsoft Teams Brand To Spread ValleyRAT
- cyberpress.org: TamperedChef Malware Abuses Signed Productivity Apps To Deliver Stealers
These reports were published around May 21, 2026. As the campaign evolves, new details may emerge. For now, treating any unexpected installer—even one that looks signed—with skepticism is the safest bet.