Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

May 8, 2026

How Crowdsourced Security is Transforming the Public Sector Cybersecur

May 8, 2026

PCPJack Campaign Boots TeamPCP Off Compromised Machines

May 8, 2026
Facebook X (Twitter) Instagram
Friday, May 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Fake Claude AI Site Drops Beagle Backdoor on Windows Users
News

Fake Claude AI Site Drops Beagle Backdoor on Windows Users

Team-CWDBy Team-CWDMay 8, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A fraudulent imitation of Anthropic’s Claude website has been used to distribute a previously undocumented backdoor named Beagle, deployed through a Dynamic Link Library (DLL) sideloading chain that abuses a signed antivirus updater binary.

The malicious domain claude-pro[.]com presents a stripped-down imitation of the legitimate Claude interface and offers a fictitious tool called Claude-Pro Relay, served as an approximately 505 MB ZIP archive, according to new analysis by Sophos X-Ops.

The researchers assessed that the site is part of an active malvertising campaign and traced the hosting infrastructure to a server set up in March 2026.

PlugX-Style Chain Leads to Different Payload

The downloaded archive contains an MSI installer that drops three files into the user’s startup folder: a signed G DATA antivirus updater renamed NOVupdate.exe, an encrypted data file and a malicious DLL named avk.dll. When the legitimate updater executes, it sideloads the malicious DLL in place of its expected library.

The DLL decrypts the data file using a reversed XOR key and runs the resulting shellcode, which loads DonutLoader, an open-source in-memory loader. Donut then deploys the final payload, the Beagle backdoor.

Sophos initially suspected a PlugX variant given the combination of a G DATA-signed binary, an avk.dll sideload and an encrypted data file, all of which were linked to PlugX in a February 2026 Lab52 report. 

The delivery of a different payload led researchers to consider that the threat actor may have retooled an established infection chain or imitated one used by another group.

Read more on fake AI sites distributing malware: Cybercriminals Mimic Kling AI to Distribute Infostealer Malware

Beagle Capabilities and Linked Samples

Beagle is a relatively simple backdoor supporting eight commands covering shell execution, file transfer, directory listing and self-removal. It communicates with its command-and-control server at license[.]claude-pro[.]com over TCP port 443 or UDP port 8080, encrypting traffic with a hardcoded AES key.

Sophos identified additional samples on VirusTotal sharing the same XOR key, dating back to February 2026. A March variant swapped the final payload for shellcode tied to AdaptixC2, an open-source red-teaming framework Sophos has previously observed in ransomware attacks. Other related samples used domains masquerading as updates for Trellix, CrowdStrike and SentinelOne.

The campaign distributed malware through Cloudflare while hosting C2 infrastructure on Alibaba Cloud, a separation researchers said could complicate takedown efforts and signal a degree of operational continuity rather than a short-lived disposable campaign.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhat to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)
Next Article How to Automate Exposure Validation to Match the Speed of AI Attacks
Team-CWD
  • Website

Related Posts

News

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

May 8, 2026
News

PCPJack Campaign Boots TeamPCP Off Compromised Machines

May 8, 2026
News

How to Automate Exposure Validation to Match the Speed of AI Attacks

May 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

A quick guide to recovering a hacked account

March 21, 2026

In memoriam: David Harley

November 12, 2025

What it is and how to protect yourself

January 8, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.