Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Distributed via Cloned AI Tool Sites in New Campaign

Malware Distributed via Cloned AI Tool Sites in New Campaign

Posted on March 9, 2026 By CWS

A recent cybersecurity threat has emerged, leveraging cloned webpages of popular development tools to distribute malware, as reported by Push Security. This new attack variant, identified as InstallFix, is part of the broader ClickFix campaign and targets users by substituting genuine install commands with malicious ones on near-identical web pages.

Malvertising Tactics Exploited

The InstallFix campaign employs malvertising strategies to direct users to these deceptive yet convincing installation pages. A notable instance involves the abuse of interest in Anthropic’s Claude Code CLI tool. Threat actors have utilized Google Ads to increase the visibility of these cloned pages, ensuring they appear in sponsored search results, which significantly boosts their reach.

These counterfeit pages are crafted to replicate legitimate ones almost exactly. However, the install script embedded in these pages redirects users to an attacker-controlled server, which then deploys infostealing malware instead of the authentic Claude Code installation script.

Execution Chain and Malware Deployment

Upon executing the malicious installation command, the victim unknowingly triggers a sequence where cmd.exe launches mshta.exe. This process retrieves and executes malicious code from a remote server, culminating in the installation of the Amatera Stealer malware.

Push Security has observed that multiple sites are executing identical binaries, indicating a coordinated attack campaign. Legitimate domains such as Cloudflare Pages, Squarespace, and Tencent EdgeOne are being exploited to host these malicious payloads, effectively camouflaging them within normal web traffic.

Broader Implications for Development Tools

The campaign is not limited to Claude Code; any development tool or website with a high click potential and easy clonability can become a target. Threat actors have been found hosting malicious terminal commands on vulnerable public pages, distributing malware through clones of the Homebrew website and rogue GitHub repositories, and using NPM packages that mimic Claude Code.

Push Security emphasizes that this malvertising and impersonation tactic is a widespread issue, potentially affecting any tool or site that can be easily replicated. The cybersecurity community is urged to remain vigilant against such threats and ensure robust security measures are in place.

In related news, various cybersecurity threats continue to evolve, with attackers exploiting DNS lookups in ClickFix attacks, delivering infostealer malware via EmEditor supply chain attacks, and more. Staying informed and adopting proactive security strategies is crucial in combating these threats.

Security Week News Tags:AI tools, Claude Code, ClickFix, Cybersecurity, Google Ads, InfoStealer, InstallFix, Malvertising, Malware, Threat Actors

Post navigation

Previous Post: Chrome Extensions Turn Malicious, Sparking Security Concerns
Next Post: AI-Driven Malware Surge by Transparent Tribe

Related Posts

Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances Security Week News
DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities Security Week News
OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail Security Week News
Czech Government Condemns Chinese Hack on Critical Infrastructure Czech Government Condemns Chinese Hack on Critical Infrastructure Security Week News
Keycard Emerges From Stealth Mode With  Million in Funding Keycard Emerges From Stealth Mode With $38 Million in Funding Security Week News
New Exploit Poses Threat to SAP NetWeaver Instances New Exploit Poses Threat to SAP NetWeaver Instances Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • KadNap Malware Uses Asus Routers for Stealth Botnet
  • Critical Ivanti Endpoint Manager Flaw Raises Security Concerns
  • Webinar on Securing Vulnerable OT in a Connected World
  • APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage
  • Kali Linux Boosts Offline AI Penetration Testing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • KadNap Malware Uses Asus Routers for Stealth Botnet
  • Critical Ivanti Endpoint Manager Flaw Raises Security Concerns
  • Webinar on Securing Vulnerable OT in a Connected World
  • APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage
  • Kali Linux Boosts Offline AI Penetration Testing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News