Hackers Are Using Claude Code Leak As Bait to Spread Malware

A hacker was quick to pounce on the accidental leak of Anthropic’s AI tool, Claude Code, by spreading malware on a GitHub page that claimed to host the source code. 

Cybersecurity vendor Zscaler spotted a hacker exploiting interest in the Claude Code leak to push two malware strains, Vidar and Ghostsocks. Zscaler traced the threat to a GitHub page from the account “idbzoomh,” which purports to offer the leaked source code for Claude Code and claims: “I spent significant effort rebuilding the entire build system from scratch, fixing every compilation error, and making this source snapshot actually work.”

The offer could be tempting to users looking for a copy of the leak, especially since Anthropic has been using copyright takedowns to remove it from GitHub. Idbzoomh’s page even claims the leak has been used to develop “Claude Code Unlocked,” a way to run Anthropic’s AI tool for free, including access to a “jailbreak mode.” That’s different from the actual leak, which only contains a partial source for the AI tool, not model weights or training data.

Pages that serves up a malicious ZIP archive containing both Windows-based malware strains

(Credit: GitHub)

Zscaler says the page will actually serve up a malicious ZIP archive containing both Windows-based malware strains, with Vidar acting as an information stealer, while Ghostsocks can let the hacker use an infected PC as a proxy to route their internet traffic. 

The malware infection attempt could trigger security alerts on a PC. So to avoid arousing suspicions, the GitHub page also says: “This application is an experimental tool for Security Research. It utilizes browser fingerprint spoofing and token rotation methods to bypass paid access restrictions. The authors are not responsible for the use of this software.”

Despite Zscaler’s findings, the malicious Claude Code leak page remains up. GitHub didn’t immediately respond to a request for comment. In the meantime, Zscaler warns: “Threat actors can (and already are) seeding trojanized versions with backdoors, data exfiltrators, or cryptominers. Unsuspecting users cloning ‘official-looking’ forks risks immediate compromise.”

About Our Expert

 

Latest articles

Related articles