Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Distributed via Cloned AI Tool Sites in New Campaign

Malware Distributed via Cloned AI Tool Sites in New Campaign

Posted on March 9, 2026 By CWS

A recent cybersecurity threat has emerged, leveraging cloned webpages of popular development tools to distribute malware, as reported by Push Security. This new attack variant, identified as InstallFix, is part of the broader ClickFix campaign and targets users by substituting genuine install commands with malicious ones on near-identical web pages.

Malvertising Tactics Exploited

The InstallFix campaign employs malvertising strategies to direct users to these deceptive yet convincing installation pages. A notable instance involves the abuse of interest in Anthropic’s Claude Code CLI tool. Threat actors have utilized Google Ads to increase the visibility of these cloned pages, ensuring they appear in sponsored search results, which significantly boosts their reach.

These counterfeit pages are crafted to replicate legitimate ones almost exactly. However, the install script embedded in these pages redirects users to an attacker-controlled server, which then deploys infostealing malware instead of the authentic Claude Code installation script.

Execution Chain and Malware Deployment

Upon executing the malicious installation command, the victim unknowingly triggers a sequence where cmd.exe launches mshta.exe. This process retrieves and executes malicious code from a remote server, culminating in the installation of the Amatera Stealer malware.

Push Security has observed that multiple sites are executing identical binaries, indicating a coordinated attack campaign. Legitimate domains such as Cloudflare Pages, Squarespace, and Tencent EdgeOne are being exploited to host these malicious payloads, effectively camouflaging them within normal web traffic.

Broader Implications for Development Tools

The campaign is not limited to Claude Code; any development tool or website with a high click potential and easy clonability can become a target. Threat actors have been found hosting malicious terminal commands on vulnerable public pages, distributing malware through clones of the Homebrew website and rogue GitHub repositories, and using NPM packages that mimic Claude Code.

Push Security emphasizes that this malvertising and impersonation tactic is a widespread issue, potentially affecting any tool or site that can be easily replicated. The cybersecurity community is urged to remain vigilant against such threats and ensure robust security measures are in place.

In related news, various cybersecurity threats continue to evolve, with attackers exploiting DNS lookups in ClickFix attacks, delivering infostealer malware via EmEditor supply chain attacks, and more. Staying informed and adopting proactive security strategies is crucial in combating these threats.

Security Week News Tags:AI tools, Claude Code, ClickFix, Cybersecurity, Google Ads, InfoStealer, InstallFix, Malvertising, Malware, Threat Actors

Post navigation

Previous Post: Chrome Extensions Turn Malicious, Sparking Security Concerns
Next Post: AI-Driven Malware Surge by Transparent Tribe

Related Posts

Organizations Warned of Exploited Linux Vulnerabilities Organizations Warned of Exploited Linux Vulnerabilities Security Week News
Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update Security Week News
Google Sues Chinese Cybercriminals Behind ‘Lighthouse’ Phishing Kit Google Sues Chinese Cybercriminals Behind ‘Lighthouse’ Phishing Kit Security Week News
Chain IQ, UBS Data Stolen in Ransomware Attack Chain IQ, UBS Data Stolen in Ransomware Attack Security Week News
Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case Security Week News
Echo Raises M in Seed Funding for Vulnerability-Free Container Images Echo Raises $15M in Seed Funding for Vulnerability-Free Container Images Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese Hacker Extradited to US for Cyberattacks
  • VECT 2.0 Ransomware Permanently Destroys Large Files
  • WhatsApp Develops Built-In Cloud Backup with Encryption
  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chinese Hacker Extradited to US for Cyberattacks
  • VECT 2.0 Ransomware Permanently Destroys Large Files
  • WhatsApp Develops Built-In Cloud Backup with Encryption
  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark