Hackers Are Using Claude Code Leak As Bait to Spread Malware | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


A hacker was quick to pounce on the accidental leak of Anthropic’s AI tool, Claude Code, by spreading malware on a GitHub page that claimed to host the source code. 

Cybersecurity vendor Zscaler spotted a hacker exploiting interest in the Claude Code leak to push two malware strains, Vidar and Ghostsocks. Zscaler traced the threat to a GitHub page from the account “idbzoomh,” which purports to offer the leaked source code for Claude Code and claims: “I spent significant effort rebuilding the entire build system from scratch, fixing every compilation error, and making this source snapshot actually work.”

The offer could be tempting to users looking for a copy of the leak, especially since Anthropic has been using copyright takedowns to remove it from GitHub. Idbzoomh’s page even claims the leak has been used to develop “Claude Code Unlocked,” a way to run Anthropic’s AI tool for free, including access to a “jailbreak mode.” That’s different from the actual leak, which only contains a partial source for the AI tool, not model weights or training data.

(Credit: GitHub)

Zscaler says the page will actually serve up a malicious ZIP archive containing both Windows-based malware strains, with Vidar acting as an information stealer, while Ghostsocks can let the hacker use an infected PC as a proxy to route their internet traffic. 

The malware infection attempt could trigger security alerts on a PC. So to avoid arousing suspicions, the GitHub page also says: “This application is an experimental tool for Security Research. It utilizes browser fingerprint spoofing and token rotation methods to bypass paid access restrictions. The authors are not responsible for the use of this software.”

Recommended by Our Editors

Despite Zscaler’s findings, the malicious Claude Code leak page remains up. GitHub didn’t immediately respond to a request for comment. In the meantime, Zscaler warns: “Threat actors can (and already are) seeding trojanized versions with backdoors, data exfiltrators, or cryptominers. Unsuspecting users cloning ‘official-looking’ forks risks immediate compromise.”



Newsletter Icon

Get Our Best Stories!

Stay Safe With the Latest Security News and Updates


SecurityWatch Newsletter Image

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy
Policy
.

Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

About Our Expert





Click Here For The Original Source.

——————————————————–

..........

.

.

National Cyber Security

FREE
VIEW