Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

US: FCC Relaxes Foreign-Made Router Ban to Allow for Security Updates

May 11, 2026

Fake Claude Code Page Pushes PowerShell Stealer at Devs

May 11, 2026

Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

May 11, 2026
Facebook X (Twitter) Instagram
Tuesday, May 12
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Fake Claude Code Page Pushes PowerShell Stealer at Devs
News

Fake Claude Code Page Pushes PowerShell Stealer at Devs

Team-CWDBy Team-CWDMay 11, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A previously undocumented information stealer has been distributed through fake Claude Code installation pages, hijacking Chromium browsers to bypass App-Bound Encryption and exfiltrate cookies, passwords and payment data from developer workstations.

The campaign was detailed on 11 May by Ontinue’s Cyber Defense Center, which traced the activity to three operator-controlled domains registered within a six-day window in April 2026. Victims arrived at the lookalike installation page after clicking sponsored search results for “install claude code.”

The lure page mimicked the layout of legitimate Claude Code documentation but rendered an altered one-line installation command directly in HTML, swapping the canonical Anthropic host for an attacker-controlled domain.

The /install.ps1 file at that domain returned a verbatim copy of the genuine installer, making automated URL scanners observe entirely clean PowerShell while the visible command on the page sent victims elsewhere.

A Native Helper Designed to Evade Behavioral Rules

Once executed, the pasted command fetched a heavily obfuscated PowerShell loader of approximately 600 KB.

The loader enumerated Chromium-family browsers, including Chrome, Edge, Brave, Vivaldi, Perplexity Comet and Arc, and reflectively injected a 4608-byte native helper into a live browser process.

The helper’s sole function is to invoke the browser’s IElevator2 COM interface, introduced in Chrome 144, to recover the App-Bound Encryption key. The technique mirrors the approach first documented in Glove Stealer in late 2024, but diverges in design.

Ontinue, a provider of AI-powered managed agentic SOC services, noted that the helper exposes no network, file or cryptographic imports.  All detection-visible activity, such as SQLite access, archive construction and HTTPS exfiltration, was confined to the PowerShell layer. The split appeared engineered specifically to defeat behavioral rule sets that inspect native binaries in isolation.

Read more on fake install pages targeting developers: Malicious VS Code Extensions Deploy Advanced Infostealer

Developer Workstations as a High-Value Pivot

Ontinue’s compile-date evidence places the sample’s construction within 60 days of the Chrome 144 release in January 2026, indicating an actively maintained development effort tracking upstream Chromium changes.

A transcription error in the embedded Edge IElevator2 IID, with two nibbles transposed in the Data3 field, causes the initial call to fail silently and trigger a fallback to the legacy IElevator interface. Ontinue highlighted that the malformed identifier doubles as a high-confidence detection signature.

The loader established persistence via a Windows scheduled task that polled the operator’s C2 every minute and exited early if the host’s region matched an exclusion list covering Iran, Russia and other Commonwealth of Independent States (CIS) members, among others.

Vineeta Sangaraju, AI tesearch engineer at Black Duck, said the choice of target is what makes the campaign worth attention.

“Developers hold the keys to an organization’s most sensitive assets – intellectual property, cloud infrastructure, CI/CD pipelines,” she said. “One compromised developer workstation does not stay contained. It pivots into source code repositories, into cloud environments and into downstream software.”

Ontinue urged defenders to enforce PowerShell Constrained Language Mode, enable script block logging and apply web content filtering against newly registered domains.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSilver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia
Next Article US: FCC Relaxes Foreign-Made Router Ban to Allow for Security Updates
Team-CWD
  • Website

Related Posts

News

Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

May 11, 2026
News

TrickMo Variant Routes Android Trojan Traffic Through TON

May 11, 2026
News

Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks

May 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Why that next data breach alert could be a trap

April 18, 2026

What it is and how to protect yourself

January 8, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.