Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Fake Claude Website Distributes PlugX RAT
    Cybersecurity

    Fake Claude Website Distributes PlugX RAT

    adminBy adminApril 13, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Claude AI hack
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A website posing as a legitimate Anthropic Claude domain was caught serving a remote access trojan to its visitors, Malwarebytes reports.

    Relying on Claude’s popularity, a threat actor created a site that hosts a download link pointing to a ZIP archive allegedly containing a pro version of the LLM.

    The file contains an MSI installer that mimics the legitimate Anthropic installation chain and installs the real Claude application.

    When the user attempts to launch the Claude app via the Desktop shortcut created during the installation, however, a VBScript dropper runs the real app in the foreground while installing malware in the background, Malwarebytes explains.

    The VBScript drops three files in the startup folder, including NOVUpdate.exe, a signed G DATA antivirus updater abused for DLL sideloading to execute a PlugX malware variant.

    PlugX is a known remote access trojan (RAT) that has been used in various espionage campaigns for nearly a decade.

    Advertisement. Scroll to continue reading.

    Within seconds after being dropped, NOVUpdate.exe creates a TCP connection to its command-and-control (C&C) infrastructure on Alibaba Cloud.

    In addition to dropping files in the startup folder, the initial VBScript writes a batch file to delete itself and the script, hiding evidence of infection.

    The sideloading files in the startup folder and the NOVUpdate.exe process are the only artifacts that persist on the infected system.

    “The script also wraps the entire malicious payload section in an On Error Resume Next statement, silently swallowing any errors so that failures in the deployment do not produce visible error dialogs that might alert the victim,” Malwarebytes notes.

    The infection chain was seen in February in a phishing campaign relying on fake meeting invitations to infect recipients with PlugX malware.

    As Malwarebytes notes, while PlugX has been historically associated with Chinese espionage groups, its source code has been shared among threat actors, making attribution difficult.

    “What is clear is that the operators behind this campaign have combined a proven sideloading technique with a timely social engineering lure—exploiting the surging popularity of AI tools to trick users into running a trojanized installer,” Malwarebytes notes.

    Related: Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday

    Related: Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit

    Related: China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation

    Related: Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

    Claude distributes Fake PlugX RAT Website
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article8 Chrome extensions I can’t live without
    Next Article I’m a Pixel fan, but the latest OneUI update is making me jealous
    admin
    • Website

    Related Posts

    Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

    April 15, 2026

    Microsoft, Salesforce Patch AI Agent Data Leak Flaws

    April 15, 2026

    Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

    April 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

    April 15, 2026

    The automation drift and how to correct course

    April 15, 2026

    Posts in your Shorts? What to expect from YouTube’s experiment

    April 15, 2026

    Microsoft, Salesforce Patch AI Agent Data Leak Flaws

    April 15, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,329)
    • Privacy & Online Earning (167)
    • SEO & Digital Marketing (814)
    • Tech Tools & Mobile / Apps (1,590)
    • WiFi / Internet & Networking (224)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

    April 15, 2026

    The automation drift and how to correct course

    April 15, 2026

    Posts in your Shorts? What to expect from YouTube’s experiment

    April 15, 2026
    Most Popular
    • Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure
    • The automation drift and how to correct course
    • Posts in your Shorts? What to expect from YouTube’s experiment
    • Microsoft, Salesforce Patch AI Agent Data Leak Flaws
    • Why ChatGPT Cites One Page Over Another (Study of 1.4M Prompts)
    • I Tried Binge, the Letterboxd Alternative That I Now Like More Than Letterboxd
    • How Endpoint Network Monitoring Enables Remote Work
    • Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.