Malvertising & SEO Poisoning Exploit Claude Code Interest to Deliver Infostealers
Source report →Threat actors are exploiting trusted advertising real estate on Google Search to capitalize on growing developer interest in Anthropic's Claude Code. Sponsored ads and SEO-poisoned organic results redirect users to convincing fake installation pages hosted on legitimate platforms such as GitLab Pages and Bitbucket Pages, lending additional credibility to the lure. The fake documentation pages embed an InstallFix payload — a social engineering technique that tricks users into copying and executing a malicious terminal command disguised as a standard install step. Sandbox analysis of the claude-code-app[.]gitlab[.]io lure confirms clipboard hijacking behavior and an obfuscated curl command that decodes via tr substitution to resolve a C2 domain (jpbassin[.]com). A parallel lure page at claude-desktop-app[.]bitbucket[.]io was disclosed by community researcher @brkalbyrk7 as part of the same campaign. The abuse of Google's ad platform as the initial trust vector makes this particularly effective against technically sophisticated targets who expect sponsored results to be vetted.
The clipboard payload contains an obfuscated curl/base64 one-liner. Character substitution via tr decodes at runtime to reveal a C2 URL. The payload downloads and executes a platform-specific infostealer: AMOS on macOS via osascript and AppleScript, and Amatera on Windows via a PowerShell-to-mshta.exe HTA execution chain. Stolen data — including browser credentials, session cookies, Keychain contents, and cryptocurrency wallets — is exfiltrated to C2 infrastructure via HTTP POST with retry logic. The campaign demonstrates a convergence of malvertising, ClickFix-style social engineering, and multi-platform infostealer delivery, targeting the developer population specifically through tool installation workflows.
IOCs (5)
Scan your environment for IOCs →DOMAIN 5
claude-code-app.gitlab.ioclaude-desktop-app.bitbucket.iojpbassin.coma2abotnet.comclaude-code.official-version.comDetections
Enable detections →- Mshta.exe Spawned by Script or Command Interpreter
- Detect browser redirects from ad networks to exploit kits or malware delivery pages
- Track user clicks on URLs that redirect through multiple domains before payload delivery
- Flag mshta.exe executing content from remote URLs or with obfuscated arguments
- Alert on processes accessing browser credential stores, cookies, or session databases
- Detect SEO-poisoned results by monitoring for sponsored ad clicks leading to newly registered or typosquatted domains
- Flag suspicious PowerShell execution — encoded commands, download cradles, or AMSI bypass
- Detect extraction of web session cookies from browser processes or profile directories
- Detect AppleScript execution spawned by non-standard parent processes
- Detect file downloads via certutil, bitsadmin, curl, or PowerShell from external URLs
- Detect clipboard-to-terminal paste operations containing encoded or obfuscated commands
- Alert on command-line arguments using character substitution, escape sequences, or encoding