Fake Claude site installs malware that gives attackers access to your computer
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是Claude这个AI工具被黑客攻击的情况。他们创建了一个假网站,模仿Claude的官方网站,然后通过这个假网站分发一个带有恶意软件的安装程序。受害者下载后,表面上安装的是正常的Claude,但实际上后台运行了PlugX恶意软件,让攻击者获得了远程访问权限。 接下来,文章详细描述了攻击的技术细节,比如假网站如何伪装成官方下载页面,ZIP文件中的恶意安装程序如何部署PlugX。还提到了恶意软件是如何利用DLL侧载技术来绕过安全检测的。此外,文章还提供了检测和防范建议,比如检查启动文件夹、使用杀毒软件等。 用户的需求是得到一个简洁的总结,所以我要提炼出关键点:假网站、恶意安装程序、PlugX恶意软件、远程访问权限、技术手段和防范建议。 现在我要把这些信息浓缩到100字以内。要注意用词准确,同时保持句子流畅。可能需要合并一些信息点,比如把技术手段和防范建议结合起来。 最终的总结应该是:黑客创建假网站模仿Claude AI工具官网,分发带PlugX恶意软件的安装程序。受害者下载后正常运行AI工具的同时,在后台部署恶意软件获取远程访问权限。文章还介绍了攻击的技术细节和防范建议。 这样应该符合用户的要求了。 </think> 黑客创建了一个模仿Claude AI工具官网的假网站,并通过该网站分发包含PlugX恶意软件的安装程序。受害者下载后看似正常运行AI工具,但后台会部署恶意软件以获取远程访问权限。文章还介绍了攻击的技术细节和防范建议。 2026-4-10 16:16:26 Author: www.malwarebytes.com(查看原文) 阅读量:2 收藏

Claude’s rapid growth—nearly 290 million web visits per month—has made it an attractive target for attackers, and this campaign shows how easy it is to fall for a fake site.

We discovered a fake website impersonating Anthropic’s Claude to serve a trojanized installer. The domain mimics Claude’s official site, and visitors who download the ZIP archive receive a copy of Claude that installs and runs as expected. But in the background, it deploys a PlugX malware chain that gives attackers remote access to the system.

A convincing fake Claude site serving PlugX malware
A convincing fake Claude site serving PlugX malware

A deep dive into the campaign

The fake site presents itself as an official download page for a “Pro” version of Claude and offers visitors a file called Claude-Pro-windows-x64.zip. Passive DNS records show the domain is equipped with active mail-sending infrastructure: its MX records have pointed to two commercial bulk-email platforms—Kingmailer (last observed March 28, 2026) and CampaignLark (observed from April 5, 2026). The switch between providers suggests the operators actively maintain and rotate their sending capability.

The ZIP contains an MSI installer that installs to C:\Program Files (x86)\Anthropic\Claude\Cluade\—a path designed to mimic a legitimate Anthropic installation, complete with a reference to Squirrel, the update framework that real Electron-based applications like Claude use. The misspelling “Cluade” is a clear red flag.

The installer places a shortcut, Claude AI.lnk, on the Desktop pointing to Claude.vbs inside the SquirrelTemp directory. When the victim clicks the shortcut, it launches a VBScript dropper, which locates claude.exe two directories up at C:\Program Files (x86)\Anthropic\Claude\Cluade\claude.exe and runs the real application in the foreground.

The dropper then creates a new shortcut, Claude.lnk, on the Desktop pointing directly to claude.exe. This leaves the victim with a working shortcut going forward, while the original Claude AI.lnk becomes a dead link after the VBScript deletes itself.

What happens behind the curtain

While the legitimate application runs in the foreground, the VBScript quietly copies three files from the SquirrelTemp directory into the Windows Startup folder at C:\Users\<USER>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.

Static analysis of the dropper script identifies these as an executable called NOVUpdate.exe, a DLL named avk.dll, and an encrypted data file called NOVUpdate.exe.dat. The script then launches NOVUpdate.exe with a hidden window (window style 0), so nothing appears on screen.

This is a textbook DLL sideloading attack, a technique catalogued by MITRE as T1574.002. NOVUpdate.exe is a legitimately signed G DATA antivirus updater. When it executes, it attempts to load a library called avk.dll from its own directory. Normally, this would be a genuine G DATA component, but here the attacker has substituted a malicious version. Signed sideloading hosts like this can complicate detection because the parent executable may appear benign to endpoint security tools.

Based on the Lab52 report documenting this same GData sideloading triad, the malicious avk.dll is expected to read and decrypt a payload stored in the accompanying .dat file. This pattern—a signed executable, a trojanized DLL, and an encrypted data file forming a three-component sideloading triad—is characteristic of the PlugX malware family, a remote access Trojan tracked in espionage campaigns since at least 2008.

Sandbox telemetry: C2 callback within seconds

Behavioural analysis in a sandboxed environment confirmed key parts of the execution chain. WScript.exe was observed dropping NOVUpdate.exe and avk.dll into the Startup folder. Just 22 seconds later, NOVUpdate.exe had established its first outbound TCP connection to 8.217.190.58 on port 443. The connection was repeated multiple times during the observation window.

The IP address 8.217.190.58 falls within an Alibaba Cloud–associated address range (8.217.x.x). Cloud hosting providers are routinely abused by threat actors for command-and-control infrastructure; the hosting provider alone does not indicate malicious ownership of the IP.

The sandbox also recorded NOVUpdate.exe modifying the registry key HKLM\System\CurrentControlSet\Services\Tcpip\Parameters, a path related to TCP/IP network configuration.

Cleaning up after itself

Static analysis of the dropper script reveals additional anti-forensic measures. After deploying the payload files, the VBScript writes a small batch file called ~del.vbs.bat that waits two seconds, then deletes both the original VBScript and the batch file itself. This means the dropper is gone from disk by the time a user or analyst goes looking for it. The only artifacts that persist are the sideloading files in the Startup folder and the running NOVUpdate.exe process. The script also wraps the entire malicious payload section in an On Error Resume Next statement, silently swallowing any errors so that failures in the deployment do not produce visible error dialogs that might alert the victim.

A known playbook with a fresh lure

This sideloading technique—abusing G DATA’s avk.dll alongside a legitimate G DATA executable and an XOR-encrypted payload file—was publicly documented by Lab52 in February 2026 in their report “PlugX Meeting Invitation via MSBuild and GDATA.” In that campaign, phishing emails used fake meeting invitations to deliver a nearly identical three-file sideloading package. The Lab52 sample used AVKTray.dat as the encrypted payload filename; this campaign uses NOVUpdate.exe.dat. The core mechanism is the same.

PlugX has historically been associated with espionage operators linked to Chinese state interests. However, researchers have noted that PlugX source code has circulated in underground forums, broadening the pool of potential operators. Attribution based on tooling alone is not definitive.

What is clear is that the operators behind this campaign have combined a proven sideloading technique with a timely social engineering lure—exploiting the surging popularity of AI tools to trick users into running a trojanized installer.

How to stay safe

This campaign works because everything looks normal. The app installs, launches, and behaves as expected, while a hidden sideloading chain runs in the background using a signed security tool to avoid suspicion.

Attackers are also moving fast. This technique was documented just weeks ago, and has already been reused with a new lure. As AI tools grow in popularity, we can expect more lookalike sites and fake installers like this.

Here’s how to check if you’ve been affected:

  • Check your Startup folder for NOVUpdate.exe, avk.dll, or NOVUpdate.exe.dat.
  • If any are present, disconnect from the internet immediately.
  • Look for the misspelled directory C:\Program Files (x86)\Anthropic\Claude\Cluade\ on your system.
  • Run a full system scan with Malwarebytes.
  • Check firewall or proxy logs for outbound connections to 8.217.190.58.
  • Change passwords for any accounts accessed from the affected machine. PlugX variants can include keylogging and credential-theft.

To stay safe:

  • Only download Claude from the official site: claude.com/download
  • Avoid links in emails, ads, or “Pro” versions offered outside official channels
  • Use an up-to-date, real-time anti-malware solution with a web protection component.

Indicators of Compromise (IOCs)

Payload filenames

Claude-Pro-windows-x64.zip (35FEEF0E6806C14F4CCDB4FCEFF8A5757956C50FB5EC9644DEDAE665304F9F96)—distributed archive

NOVUpdate.exe (be153ac4db95db7520049a4c1e5182be07d27d2c11088a2d768e931b9a981c7f)—legitimate G DATA updater (sideloading host)

avk.dll (d5590802bf0926ac30d8e31c0911439c35aead82bf17771cfd1f9a785a7bf143)—malicious DLL (PlugX loader)

NOVUpdate.exe.dat (8ac88aeecd19d842729f000c6ab732261cb11dd15cdcbb2dd137dc768b2f12bc)—encrypted payload

Network indicators

  • 8.217.190.58:443 (TCP)—C2 destination

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

About the author

Passionate about antivirus solutions, Stefan has been involved in malware testing and AV product QA from an early age. As part of the Malwarebytes team, Stefan is dedicated to protecting customers and ensuring their security.


文章来源: https://www.malwarebytes.com/blog/scams/2026/04/fake-claude-site-installs-malware-that-gives-attackers-access-to-your-computer
如有侵权请联系:admin#unsafe.sh