Infostealers disguised as Claude Code target developers through fake AI tool downloads

2 Sources

Share

Security researchers at Kaspersky uncovered a malvertising campaign targeting software developers searching for AI coding assistants like Claude Code and OpenClaw. Hackers use sponsored Google Ads to direct users to fake installation pages that deliver infostealers—Amatera for Windows and AMOS for macOS—capable of stealing source code, corporate data, and authentication credentials.

Hackers Target Software Developers with Fake AI Developer Tools

Security researchers at Kaspersky have exposed an ongoing malvertising campaign that exploits the growing popularity of AI developer tools to infect software developers with infostealers

1

. The attack specifically targets developers searching for installation instructions for Claude Code, OpenClaw, and other AI coding assistants, using sponsored Google search results to redirect victims to malicious websites that closely mimic official pages

2

.

Claude Code is a coding-focused AI assistant developed by Anthropic, designed to help software developers write, edit, and debug code—similar to tools like GitHub Copilot. The timing of this campaign is particularly concerning given that Claude has exploded in popularity over recent weeks, making developers more likely to search for these tools

2

.

Source: MakeUseOf

Source: MakeUseOf

How the Malvertising Campaign Operates

When developers search for terms like "Claude Code download" or "OpenClaw download," malicious ads appear at the top of search engine results pages through sponsored Google Ads

1

. Clicking these ads leads to websites hosted on platforms like Squarespace that are visually identical to authentic pages set up by Anthropic and OpenAI

2

.

The attack becomes particularly insidious because installing Claude Code requires copying and pasting code into the Windows Command Prompt or macOS Terminal, rather than downloading a traditional application. This makes the compromise harder to spot, as developers accustomed to running terminal commands may not scrutinize the instructions carefully

1

. Hackers are disguising information-stealing malware within these installation commands, hoping users will simply copy and paste without verification

2

.

Different Infostealers Target Windows and macOS Users

The campaign delivers different malware payloads depending on the victim's operating system. Windows users who execute the malicious commands will be infected with Amatera for Windows, an information-stealing malware that collects data from user directories, web browsers, and cryptocurrency wallets

1

. Kaspersky noted that Amatera has previously appeared in campaigns using the ClickFix distribution technique and operates under a Malware-as-a-Service (MaaS) model

1

.

Meanwhile, macOS users face infection from AMOS for macOS, a notorious infostealer that has been deployed in countless campaigns targeting Apple users

1

. Both infostealers are capable of stealing sensitive data including authentication credentials and source code from active development projects

1

.

Corporate Data and Credentials at Risk

Vladimir Gursky, a cybersecurity expert at Kaspersky, emphasized the severity of this threat: "The campaign poses significant risks because AI development tools suchs as Claude Code and OpenClaw are widely used not only by hobbyists and automation enthusiasts but also by professional developers working in large organizations"

1

.

If infected, victims may unknowingly expose source code from active projects, confidential corporate data, authentication credentials, and private accounts. This makes the campaign particularly dangerous for businesses whose developers rely on AI-assisted coding tools . The attack also targets other popular AI tools, including Doubao, an AI tool from ByteDance

2

.

Protecting Against Disguising Malware as Claude Code Attacks

Kaspersky recommends several security practices to avoid falling victim to this malvertising campaign. Developers should always verify links before clicking, checking URLs carefully—the malicious sites in these attacks are hosted on Squarespace, which is visible in the address bar

2

. More importantly, users should never blindly copy and paste terminal commands without reviewing them first, even if the source appears official

2

.

Following organic search results rather than sponsored links can also reduce exposure to these threats, as malicious actors frequently abuse Google Ads to impersonate legitimate services. Kaspersky previously identified a similar attack using Google Ads in December 2025, suggesting this tactic is becoming more common

2

. As AI tools continue gaining traction among software developers, security researchers expect AI-related attacks like this to increase in frequency and sophistication

2

.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo