Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Last update: 01/09/2025
Type:
- Infostealer
TrueSec - https://www.truesec.com/hub/blog/tamperedchef-the-bad-pdf-editor
A recent malicious campaign has been observed delivering trojanized applications disguised as a PDF editor or offering product manuals. This malware has the capability to steal credentials and turn the compromised Windows device into a proxy.
Multiple incidents have been reported; immediate action is required.
The malware—commonly referred to as “AppSuite-PDF”, “PDFEditor” or “ManualFinder”—is actively distributed through deceptive online advertisements and malicious links positioned prominently in search results. These links often redirect users to websites that appear legitimate and professional but deliver a trojanized application.
A single click on one of these links is enough to download and install the malware. Any user relying on advertisements to obtain software is at risk of compromise.
Although the applications appear authentic, they covertly install malware with two primary functions: credential theft and proxy creation. Compromised Windows devices are repurposed as proxies, providing threat actors with persistence and further exploitation opportunities.
The malware often remains dormant for weeks, allowing infections to spread undetected. Once activated, it can hijack accounts, weaken security defenses, and establish footholds for additional attacks. This significantly elevates organizational risk by endangering access credentials, disrupting business continuity, and eroding trust.
This is an ongoing campaign, with new distribution techniques and activity continuously being uncovered.
For the latest developments, consult the following resources:
If you are experiencing issues, suspect you are under attack, or have relevant information: https://ccb.belgium.be/cert/report-incident
The CCB recommends implementing the following preventive measures.
More measures are available at: Cyber Fundamentals Framework
Organisations should train employees to:
To verify if you are compromised, it is recommended to:
If your investigation showed you were in fact compromised, the CCB recommends:
Reset the credentials of all users, including: Enterprise credentials, Credentials present in the browser, All credentials in the operating system vault (Windows Credential Manager)
Feedback
We kindly ask you to send feedback to info@ccb.belgium.be.
Please include what actions you have taken.
For questions regarding this letter, please consult first our FAQ on Spear Warnings.