TamperedChef Malware: When a Signed App Isn’t Safe – How to Spot and Avoid It

Most security advice tells you to only download software that is digitally signed. The logic is simple: a valid signature means a trusted publisher vouches for the file, and tampering would break the signature. That’s still good advice, but it’s not foolproof. A new malware campaign called TamperedChef is actively abusing that trust by delivering info-stealers and remote access trojans (RATs) inside signed productivity applications.

Here’s what you need to know about the threat and, more importantly, how to avoid becoming a victim.

What Happened

Security researchers recently detailed the TamperedChef campaign, which targets people looking for productivity software – think fake download pages for Microsoft Teams, Slack, Notion, or similar tools. According to the reporting from CyberSecurityNews, the attackers are repackaging legitimate signed apps with malicious code while preserving the original digital signature.

How? In some cases, threat actors steal or compromise code-signing certificates. In others, they might trick a legitimate developer into signing a tampered version, or they abuse certificates from defunct companies. Once signed, the malware-laden installer looks identical to the real thing to both users and many antivirus engines.

The infection chain typically works like this:

  1. You search for a free or cracked version of a popular app.
  2. You land on a convincing-looking download site (often a typosquatting domain).
  3. You download and run the signed installer.
  4. The installer launches the legitimate app – so it works as expected – but also drops background payloads.
  5. Those payloads could be an information stealer (harvesting passwords, cookies, credit card data) or a RAT that gives attackers remote control of your machine.

Because the file is signed, Windows may show “Verified publisher” and some security tools may skip deeper inspection, assuming it’s safe.

Why It Matters

Signed malware is a growing problem. It bypasses a basic trust assumption that users and even IT teams rely on. The TamperedChef campaign is active now, and the use of productivity apps makes it particularly effective because:

  • High trust. People let their guard down with office tools.
  • Wide appeal. Productivity software is downloaded by employees, freelancers, students – anyone.
  • Stealth. A tampered app still works, so you might not notice anything wrong until your accounts are compromised or your system slows down.

The risks go beyond password theft. A RAT can capture screenshots, log keystrokes, record microphone audio, and even hold your files for ransom. For businesses, a single infected machine can lead to credential theft that escalates into a full network breach.

What Readers Can Do

You don’t need to be a security expert to reduce your risk. These steps are practical and effective:

1. Stick to official sources. Download software directly from the developer’s website or from the official Microsoft Store, Mac App Store, or verified package managers (like winget, Homebrew). Avoid third-party download sites, especially those offering “cracked” or “free pro” versions.

2. Verify the publisher, not just the signature. A valid signature doesn’t mean the file is safe – it means the signature hasn’t been broken. Check the publisher name in the file properties (right-click → Properties → Digital Signatures). Do you recognize the company? Is it the actual developer of that app? If the publisher looks odd or generic, be suspicious.

3. Check file hashes if available. Some developers publish SHA-256 checksums or PGP signatures for their downloads. You can compare the hash of the file you downloaded against the official one. This is more reliable than trusting the visual signature display.

4. Enable app reputation checks. In Windows, turn on Smart App Control (available in recent versions) or Windows Defender Application Guard. On macOS, enable Gatekeeper and keep it set to “App Store and identified developers.” These features add scanning and reputation checking beyond just signature validation.

5. Monitor app behavior after installation. Did the installer ask for unusual permissions (e.g., enabling microphone, accessing your Documents folder) that the app shouldn’t need? Did it launch extra processes or make network connections immediately? Use a free tool like Process Explorer or the built-in Task Manager to watch for unexpected activity.

6. If you suspect infection:

  • Disconnect your computer from the internet immediately.
  • Run a full scan with a reputable antivirus (Windows Defender, Malwarebytes, etc.).
  • Change passwords for any accounts you’ve accessed on that machine – use a different, trusted device.
  • Enable multi-factor authentication everywhere you can.
  • Monitor your bank and email accounts for unusual activity.

Staying Vigilant

The TamperedChef campaign is a reminder that digital signatures are a useful layer of security, not a guarantee. Attackers are constantly finding ways to bend that trust to their advantage. The safest approach is to treat every download with a bit of skepticism – especially if you weren’t expecting the file or the download source feels off.

When in doubt, verify. It only takes a minute to check the publisher or compare a hash, and that minute could save you from a much bigger cleanup job.


Sources:

  • CyberSecurityNews – “TamperedChef Malware Uses Signed Productivity Apps to Deliver Stealers and RATs” (May 2026)
  • General security guidance on signed malware from industry researchers.