← Back to feed

Fake Claude AI Installer Campaign Distributes PlugX Malware via Phishing

Date: 2026-04-22
Tags: malware, malicious-tool

Executive Summary

Fake Claude AI installer mimicking Anthropic spreads PlugX malware on Windows, using DLL sideloading to gain persistent remote access to infected systems. Cybersecurity experts from Malwarebytes found a malicious campaign where scammers use the popularity of Anthropic's AI tool Claude to spread malware. Hackers made a fake website that looks just like the official one from Anthropic and offers a Pro version of the tool for Windows to lure people into downloading a malicious file.

Campaign Summary

FieldDetail
Campaign / MalwareClaude AI Pro Installer Phishing Campaign
AttributionUnknown (Financially Motivated Threat Actor) (confidence: low)
TargetWindows users seeking Claude AI Pro software; development teams using Claude
VectorPhishing emails linking to fake Anthropic website distributing trojanized Claude installer package
Statusactive
First Observed2026-04-05

Detailed Findings

The scam kicks in after the user is led to visit a site via phishing emails and downloads a folder named Claude-Pro-windows-x64.zip. There is an MSI installer inside it that places a shortcut called Claude AI.lnk on the desktop, which runs a VBScript when clicked. This script first launches the original Claude app to keep the user distracted and simultaneously installs the PlugX malware to allow hackers to remotely control the compromised device. Researchers observed attackers using Kingmailer on 28 March 2026 and switching to CampaignLark on 5 April 2026 to distribute phishing emails. A simple spelling mistake reveals the fake: hackers created a folder named 'Cluade' instead of Claude at C:\Program Files (x86)\Anthropic\Claude\Cluade.

MITRE ATT&CK Mapping

TechniqueIDContext
PhishingT1566Phishing emails directing users to fake Anthropic download site
ExecutionT1204User execution of malicious VBScript via desktop shortcut
DLL SideloadingT1574.001PlugX malware leverages DLL sideloading for persistence

IOCs

Domains

_No specific IOCs published; detection signatures recommended for PlugX family and associated infrastructure_

Full URL Paths

_No specific IOCs published; detection signatures recommended for PlugX family and associated infrastructure_

Splunk Format

_No IOCs available for Splunk query_

Package Indicators

Claude-Pro-windows-x64.zip

Detection Recommendations

Alert on downloads of Claude-Pro-windows-x64.zip or variants; monitor for installation of files to C:\Program Files (x86)\Anthropic\Claude\Cluade; detect PlugX malware signatures (NOVUpdate.exe, avk.dll in Startup folders); block Kingmailer and CampaignLark infrastructure IPs at email gateway; implement YARA rules for PlugX DLL sideloading patterns; educate users to download only from official claude.ai domain.

References