News

Fake Claude Code Downloads Spread Malware, Target Developers

Fake Claude Code Installers Spread Infostealer Malware, Putting Developers and Code Credentials at Risk

Written By : Somatirtha
Reviewed By : Sankha Ghosh

A new malware campaign is exploiting the popularity of Claude Code, targeting developers searching for AI coding tools online. Cybersecurity researchers warn that attackers have created fake download pages that distribute infostealer malware disguised as installers for the AI programming assistant.

The campaign is an indication of an increasing trend whereby threat actors are using trending AI tools as a way of luring unsuspecting victims.

Fake Download Pages Lure Developers

Several websites that were impersonating legitimate Claude Code download sites for the program were identified. These sites look identical to legitimate sites for downloading the program, and it is hard to identify the difference at first glance.

The developer who downloads the installer, thinking it is an AI coding assistant, actually runs a malicious program. Instead of installing the program, the installer runs scripts in the background, installing info-stealer malware on the computer undetected by the user.

Malware Uses Built-In Windows Tool

The malware, according to researchers, uses the mshta.exe tool, which is a legitimate tool in the Windows operating system used for running HTML applications. Using this tool, the malware is able to run scripts undetected, as it is a legitimate tool and does not raise any alarms for malware detection tools.

The malware, once activated, starts to collect data from the infected computer.

Also Read: AI Gone Wrong: OpenAI Bans Accounts Linked to Fraud, Propaganda & Cybercrime

Sensitive Developer Data at Risk

The infostealer is designed to steal information that could potentially give the attacker more inroads into the developer’s system. This could include browser credentials, authentication tokens, saved passwords, cryptocurrency wallet information, or API keys.

For the developer, this information could potentially link directly into their codebase, cloud systems, or deployment systems. This is a serious concern as a compromised machine could potentially expose the attacker to much more than their personal information.

A Growing Threat to Software Supply Chains

Security experts are saying that by attacking the developer, the attacker is giving themselves a way into the larger world of the software ecosystem. This is because, should credentials to code repositories or cloud systems be compromised, the attacker could potentially manipulate the source code or the production systems themselves.

Researchers are advising developers to ensure that they are downloading tools from trusted sources, as well as to verify the website URL before installing new software. As the popularity of AI development tools continues to grow, it is expected that this type of attack will continue to occur.

Join our WhatsApp Channel to get the latest news, exclusives and videos on WhatsApp

Fastest Growing Cryptos in 2026: BlockDAG, Solana, Tron, and Cardano Rise on Real-world Utility

Iran Crypto Flows Top $3B as Sanctions Evasion Expands in 2025

The 100x Era Begins: BlockDAG Officially Lists on LBank, Coinstore, BitMart & Direct Swap in Historic 2026 Debut

Will XRP Reach $1,000 in an Institutional Adoption Scenario?

XRP News Today: XRP Price Holds Near Key Support as Repeat Signal Hints at a 27% Rally