Malware & RansomwareHIGH

Claude Code Leak - Infostealer Malware Delivered via GitHub

Featured image for Claude Code Leak - Infostealer Malware Delivered via GitHub
BCBleepingComputer
Claude CodeVidarGitHubZscalermalware
🎯

Basically, hackers are using a leaked AI tool's code to trick people into downloading malware.

Quick Summary

A recent leak of Claude Code's source code is being exploited by hackers to distribute Vidar malware through fake GitHub repositories. Users searching for the leak are at high risk of infection. Stay informed and cautious to avoid downloading malicious software.

What Happened

Recently, the source code for Claude Code, an AI terminal agent developed by Anthropic, was accidentally leaked. This leak occurred when a 59.8 MB JavaScript source map was included in a published npm package. The exposed code included 513,000 lines of TypeScript, revealing sensitive orchestration logic and security features.

In the wake of this leak, threat actors have taken advantage by creating fake GitHub repositories that claim to host the leaked code. These repositories are designed to attract users searching for the Claude Code leak, ultimately delivering Vidar, an information-stealing malware.

Who's Affected

The primary targets of this attack are users who are curious about the leaked Claude Code. Many individuals, including developers and researchers, may be searching for the code out of interest or for legitimate purposes. However, they are at risk of downloading malicious software instead.

How It Works

The malicious GitHub repository, created by a user identified as β€œidbzoomh,” promotes a fake leak that claims to offer unlocked enterprise features. It is optimized for search engines, ensuring it appears at the top of search results for queries related to the leaked code. When users download the 7-Zip archive, they receive a Rust-based executable named ClaudeCode_x64.exe. Launching this executable installs Vidar, along with the GhostSocks proxy tool, on the user's system.

Signs of Infection

Users may notice unusual behavior on their systems after executing the downloaded file. Signs include unexpected network activity, slow system performance, and unauthorized access to sensitive data. If you suspect infection, it’s crucial to act quickly.

How to Protect Yourself

To avoid falling victim to this scheme, follow these precautions:

  • Verify Sources: Always download software from official and reputable sources.
  • Use Antivirus Software: Ensure your antivirus is up to date and running.
  • Be Cautious with Archives: Be wary of downloading executable files from unknown or suspicious repositories.
  • Monitor Network Activity: Keep an eye on your network for any unusual activity that may indicate malware presence.

Conclusion

This incident underscores the importance of vigilance when exploring new software, especially following a high-profile leak. As threat actors continue to exploit such vulnerabilities, users must remain cautious and informed to protect themselves from malware attacks.

πŸ”’ Pro insight: This incident exemplifies the opportunistic tactics of threat actors leveraging high-profile leaks to distribute malware, highlighting the need for user awareness.

Original article from

BCBleepingComputerΒ· Bill Toulas
Read Full Article

Related Pings

HIGHMalware & Ransomware

CrystalRAT - New Malware-as-a-Service Offers Remote Access

A new malware-as-a-service called CrystalRAT has emerged, offering remote access and prank features. It targets popular applications and browsers, posing significant risks to users. Cybersecurity experts warn of its potential for widespread exploitation.

SC MediaΒ·
HIGHMalware & Ransomware

NoVoice Android Malware - Steals WhatsApp Data via Apps

NoVoice malware has infiltrated Google Play, stealing WhatsApp data from millions. Users are at risk of account cloning. Immediate action is necessary to secure devices.

SC MediaΒ·
HIGHMalware & Ransomware

WhatsApp Alerts Users About Spyware in Fake iPhone App

WhatsApp warns of a fake iPhone app containing spyware affecting around 200 users. The company is taking action against the creators and urges users to uninstall the malicious app immediately.

SC MediaΒ·
HIGHMalware & Ransomware

Ransomware Attackers Exploit Legitimate IT Tools to Bypass Antivirus

Ransomware attackers are using legitimate IT tools to bypass antivirus systems. This trend poses a significant risk to organizations, making detection difficult. Staying informed and proactive is crucial for defense.

SC MediaΒ·
HIGHMalware & Ransomware

Phishing Campaign - Delivers Casbaneiro and Horabot Trojans

A new phishing campaign is targeting Spanish-speaking users, delivering the Casbaneiro and Horabot banking trojans. This sophisticated attack poses serious risks, as it exploits various methods to trick victims. Stay alert and protect your sensitive information.

SC MediaΒ·
HIGHMalware & Ransomware

WhatsApp Alerts Users After Fake iOS App Installs Spyware

WhatsApp has alerted users about a fake iOS app that installed spyware on their devices. Most affected users are in Italy. This incident highlights the growing threat of social engineering tactics in cyber attacks.

The Hacker NewsΒ·