Hackers exploit Claude Code leak to spread credential-stealing malware via fake GitHub repos

3 Sources

Share

Cybercriminals are weaponizing the recent Claude Code source code leak to distribute malware through deceptive repositories on GitHub. Security researchers at Zscaler discovered fake repositories delivering Vidar information stealer and GhostSocks proxy malware to unsuspecting users seeking the leaked Anthropic AI tool code. The malicious campaign highlights how quickly threat actors capitalize on high-profile AI-related leaks.

Threat Actors Weaponize Claude Code Leak

Cybercriminals moved swiftly to exploit the accidental Claude Code leak from Anthropic, creating fake GitHub repositories that deliver malware instead of the promised source code. On March 31, Anthropic inadvertently exposed the full client-side source code of its terminal-based AI agent through a 59.8 MB JavaScript source map accidentally included in the published npm package

3

. The leak contained 513,000 lines of unobfuscated TypeScript across 1,906 files, revealing orchestration logic, permissions, execution systems, and hidden features

3

.

Source: PC Magazine

Source: PC Magazine

Malicious Campaign Delivers Vidar and Ghostsocks

Cybersecurity firm Zscaler identified a malicious GitHub page from the account "idbzoomh" that claims to offer the leaked source code while actually distributing credential-stealing malware

1

. The deceptive repositories advertise "unlocked enterprise features" and no usage restrictions to lure victims

3

. When users download the malicious .7z archive named "Claude Code - Leaked Source Code," they receive a Rust-based dropper executable called ClaudeCode_x64.exe

2

. This dropper deploys Vidar v18.7, an information stealer that collects account credentials, credit card data, and browser history, alongside GhostSocks, a network traffic proxy tool that turns infected devices into proxy infrastructure for cybercriminals

2

.

Source: BleepingComputer

Source: BleepingComputer

Search Engine Optimization Amplifies Threat

The fake GitHub repositories were optimized for search engine results, appearing near the top of Google searches for queries like "leaked Claude Code"

3

. At least two trojanized Claude Code repositories remained active on GitHub at the time of reporting, with one accumulating 793 forks and 564 stars

2

. Tens of thousands of people eagerly downloaded what they believed was the leaked source code this week

2

. The malicious page even includes disclaimers about security alerts, claiming the application is "an experimental tool for Security Research" to avoid arousing suspicion when antivirus software triggers warnings

1

.

Source: The Register

Source: The Register

Broader Pattern of AI-Related Exploitation

This malicious campaign follows a similar pattern observed in March when security firm Huntress warned about threat actors using OpenClaw, an AI agent platform, as a GitHub lure to deliver the same two payloads

2

. Zscaler researchers emphasized that this rapid movement to capitalize on buzzy new products and news events increases the chance of opportunistic compromise, especially through trojanized software and deceptive repositories

2

. The researchers warn that threat actors are already seeding trojanized versions with backdoors, data exfiltration tools, and cryptominers, putting unsuspecting users who clone official-looking forks at immediate risk of compromise

1

. The malicious archive is updated frequently, suggesting additional payloads may be added in future iterations

3

. For developers and AI enthusiasts, this incident underscores the critical need for verification before downloading code from repositories, particularly during high-profile AI-related leaks when cybercriminals act quickly to exploit public interest.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo