Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Distributed via Cloned AI Tool Sites in New Campaign

Malware Distributed via Cloned AI Tool Sites in New Campaign

Posted on March 9, 2026 By CWS

A recent cybersecurity threat has emerged, leveraging cloned webpages of popular development tools to distribute malware, as reported by Push Security. This new attack variant, identified as InstallFix, is part of the broader ClickFix campaign and targets users by substituting genuine install commands with malicious ones on near-identical web pages.

Malvertising Tactics Exploited

The InstallFix campaign employs malvertising strategies to direct users to these deceptive yet convincing installation pages. A notable instance involves the abuse of interest in Anthropic’s Claude Code CLI tool. Threat actors have utilized Google Ads to increase the visibility of these cloned pages, ensuring they appear in sponsored search results, which significantly boosts their reach.

These counterfeit pages are crafted to replicate legitimate ones almost exactly. However, the install script embedded in these pages redirects users to an attacker-controlled server, which then deploys infostealing malware instead of the authentic Claude Code installation script.

Execution Chain and Malware Deployment

Upon executing the malicious installation command, the victim unknowingly triggers a sequence where cmd.exe launches mshta.exe. This process retrieves and executes malicious code from a remote server, culminating in the installation of the Amatera Stealer malware.

Push Security has observed that multiple sites are executing identical binaries, indicating a coordinated attack campaign. Legitimate domains such as Cloudflare Pages, Squarespace, and Tencent EdgeOne are being exploited to host these malicious payloads, effectively camouflaging them within normal web traffic.

Broader Implications for Development Tools

The campaign is not limited to Claude Code; any development tool or website with a high click potential and easy clonability can become a target. Threat actors have been found hosting malicious terminal commands on vulnerable public pages, distributing malware through clones of the Homebrew website and rogue GitHub repositories, and using NPM packages that mimic Claude Code.

Push Security emphasizes that this malvertising and impersonation tactic is a widespread issue, potentially affecting any tool or site that can be easily replicated. The cybersecurity community is urged to remain vigilant against such threats and ensure robust security measures are in place.

In related news, various cybersecurity threats continue to evolve, with attackers exploiting DNS lookups in ClickFix attacks, delivering infostealer malware via EmEditor supply chain attacks, and more. Staying informed and adopting proactive security strategies is crucial in combating these threats.

Security Week News Tags:AI tools, Claude Code, ClickFix, Cybersecurity, Google Ads, InfoStealer, InstallFix, Malvertising, Malware, Threat Actors

Post navigation

Previous Post: Chrome Extensions Turn Malicious, Sparking Security Concerns
Next Post: AI-Driven Malware Surge by Transparent Tribe

Related Posts

CrowdStrike Insider Helped Hackers Falsely Claim System Breach CrowdStrike Insider Helped Hackers Falsely Claim System Breach Security Week News
RevEng.ai Raises .15 Million to Secure Software Supply Chain RevEng.ai Raises $4.15 Million to Secure Software Supply Chain Security Week News
Critical Vulnerabilities Patched in TP-Link’s Omada Gateways Critical Vulnerabilities Patched in TP-Link’s Omada Gateways Security Week News
North Korean Hackers Have Stolen  Billion in Cryptocurrency in 2025 North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025 Security Week News
France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine Security Week News
Cyber Insights 2026: Information Sharing Cyber Insights 2026: Information Sharing Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FortiGate Firewalls Exploited by Cyber Attackers
  • Microsoft’s March 2026 Patch Tuesday Fixes 78 Vulnerabilities
  • Jazz Secures $61M to Revolutionize AI-Powered DLP
  • Chinese Cyber Threat Targets Qatar Amid Middle East Unrest
  • SAP Addresses Critical Bugs in FS-QUO and NetWeaver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FortiGate Firewalls Exploited by Cyber Attackers
  • Microsoft’s March 2026 Patch Tuesday Fixes 78 Vulnerabilities
  • Jazz Secures $61M to Revolutionize AI-Powered DLP
  • Chinese Cyber Threat Targets Qatar Amid Middle East Unrest
  • SAP Addresses Critical Bugs in FS-QUO and NetWeaver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News