Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Distributed via Cloned AI Tool Sites in New Campaign

Malware Distributed via Cloned AI Tool Sites in New Campaign

Posted on March 9, 2026 By CWS

A recent cybersecurity threat has emerged, leveraging cloned webpages of popular development tools to distribute malware, as reported by Push Security. This new attack variant, identified as InstallFix, is part of the broader ClickFix campaign and targets users by substituting genuine install commands with malicious ones on near-identical web pages.

Malvertising Tactics Exploited

The InstallFix campaign employs malvertising strategies to direct users to these deceptive yet convincing installation pages. A notable instance involves the abuse of interest in Anthropic’s Claude Code CLI tool. Threat actors have utilized Google Ads to increase the visibility of these cloned pages, ensuring they appear in sponsored search results, which significantly boosts their reach.

These counterfeit pages are crafted to replicate legitimate ones almost exactly. However, the install script embedded in these pages redirects users to an attacker-controlled server, which then deploys infostealing malware instead of the authentic Claude Code installation script.

Execution Chain and Malware Deployment

Upon executing the malicious installation command, the victim unknowingly triggers a sequence where cmd.exe launches mshta.exe. This process retrieves and executes malicious code from a remote server, culminating in the installation of the Amatera Stealer malware.

Push Security has observed that multiple sites are executing identical binaries, indicating a coordinated attack campaign. Legitimate domains such as Cloudflare Pages, Squarespace, and Tencent EdgeOne are being exploited to host these malicious payloads, effectively camouflaging them within normal web traffic.

Broader Implications for Development Tools

The campaign is not limited to Claude Code; any development tool or website with a high click potential and easy clonability can become a target. Threat actors have been found hosting malicious terminal commands on vulnerable public pages, distributing malware through clones of the Homebrew website and rogue GitHub repositories, and using NPM packages that mimic Claude Code.

Push Security emphasizes that this malvertising and impersonation tactic is a widespread issue, potentially affecting any tool or site that can be easily replicated. The cybersecurity community is urged to remain vigilant against such threats and ensure robust security measures are in place.

In related news, various cybersecurity threats continue to evolve, with attackers exploiting DNS lookups in ClickFix attacks, delivering infostealer malware via EmEditor supply chain attacks, and more. Staying informed and adopting proactive security strategies is crucial in combating these threats.

Security Week News Tags:AI tools, Claude Code, ClickFix, Cybersecurity, Google Ads, InfoStealer, InstallFix, Malvertising, Malware, Threat Actors

Post navigation

Previous Post: Chrome Extensions Turn Malicious, Sparking Security Concerns
Next Post: AI-Driven Malware Surge by Transparent Tribe

Related Posts

Coyote Banking Trojan First to Abuse Microsoft UIA Coyote Banking Trojan First to Abuse Microsoft UIA Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact Security Week News
Mercedes F1 Team Principal Toto Wolff Sells 15% Stake to CrowdStrike CEO George Kurtz Mercedes F1 Team Principal Toto Wolff Sells 15% Stake to CrowdStrike CEO George Kurtz Security Week News
Hackers Target Swedish Power Grid Operator Hackers Target Swedish Power Grid Operator Security Week News
Critical Chrome Vulnerability Earns Researcher ,000 Critical Chrome Vulnerability Earns Researcher $43,000 Security Week News
263,000 Impacted by Esse Health Data Breach 263,000 Impacted by Esse Health Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge
  • Chinese Hacker Linked to Cyber Espionage Extradited to U.S.
  • Sevii Introduces Predictable AI Defense Costs
  • Critical Flaw in Hugging Face LeRobot Exposes Security Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GlassWorm Malware Tied to Over 70 Open VSX Clones
  • Zero Trust Data Movement: The Overlooked Challenge
  • Chinese Hacker Linked to Cyber Espionage Extradited to U.S.
  • Sevii Introduces Predictable AI Defense Costs
  • Critical Flaw in Hugging Face LeRobot Exposes Security Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark