DIGITAL LIFE
![]()
AI tools malware campaign detected targeting programmers
Kaspersky has identified a malware campaign targeting AI tools that uses sponsored ads on Google to distribute infostealers disguised as Claude Code, OpenClaw, and Doubao. The attackers accurately mimic the official documentation of these tools, inducing programmers to execute installation commands that compromise their systems. Once infected, devices are exposed to the theft of credentials, source code of active projects, browser sessions, and cryptocurrency wallet data.
The central mechanism of this campaign distinguishes it from email phishing or supply chain attacks. When searching for "Claude Code download," sponsored ads appear at the top of the results, redirecting to fraudulent pages hosted on Squarespace. These pages are visually identical to the official documentation and copy the installation instructions verbatim, making manual detection virtually impossible for a user without prior suspicions.
The user copies the commands and executes them. At this point, instead of installing the development tool, it installs malware on your system.
According to Kaspersky, the malware installed varies depending on the victim's operating system:
-Operating: Windows System: Amatera Malware targeted data: User directories, browsers, cryptocurrency wallets
-Operating: macOS System: AMOS Browser Malware targeted data: data wallets, confidential files
Amatera operates according to a Malware-as-a-Service (MaaS) model, which means that the infrastructure is available to multiple criminal groups, not just the original perpetrators. AMOS, on the other hand, is an infostealer with a documented history of previous campaigns targeting Apple devices, described by Kaspersky itself in previous reports.
Claude Code and OpenClaw: high-value targets...The choice of imitated tools is not random. Claude Code is a development agent created by Anthropic, with increasing adoption in software engineering teams globally. OpenClaw, in turn, is an open-source tool that has accumulated more than 190,000 stars on GitHub and is among the most sought after by programmers in 2026. The popularity of these platforms makes them prime targets for imitation: the more users search for installation instructions, the greater the likelihood of clicking on a fraudulent ad.
Kaspersky also identified similar campaigns imitating Doubao, a ByteDance tool with a presence mainly in the Asian market. Its relevance to the European context is not justified in the statement.
A pattern that is not new...This is not the first campaign to exploit users' interest in AI tools. In December 2025, Kaspersky documented a similar attack in which attackers distributed an infostealer for macOS through Google Ads. A chat interface mimicked a ChatGPT tutorial and guided users to install the Atlas Browser, with the instructions hosted on a website that simulated the presence of OpenAI. The pattern is the same: exploiting the trust that programmers place in sponsored search results.
What the press release doesn't say...Kaspersky does not present verifiable technical indicators of compromise, such as malicious domains, file hashes, or command and control server addresses. Without this data, security teams lack a concrete basis for implementing preventative blocks. The press release also does not quantify the number of identified victims or the affected countries, preventing an objective assessment of the campaign's true scale.
How to reduce the risk...Kaspersky presents four recommendations for programmers and IT teams:
Always verify that download links point to the official websites of the projects.
Review any command-line instructions before executing them, especially when copied from external sources.
Do not follow installation guides that have not been specifically requested or that are not fully understood.
Use endpoint security solutions with the ability to detect infostealers and malicious downloads.
A sophisticated, ongoing malware campaign active as of March 2026 is actively targeting software developers and programmers by impersonating popular AI coding tools and, in a separate campaign, through fake, highly convincing job interviews. The primary goal of these campaigns is to steal sensitive data, including credentials, browser-stored passwords, cryptocurrency wallets, and internal company code.
Key aspects of the AI tool malware campaign(below)
Targets & method: Attackers are targeting developers searching for tools like Claude Code, OpenClaw, and others. They use Google Search ads to display fake, malicious, top-ranked websites that mimic official sites.
Malware distribution (Claude Fraud): This campaign, often called "Claude Fraud," has two main vectors:
macOS (MacSync Infostealer): Fake landing pages use a "ClickFix" terminal command technique to persuade users to execute malicious code.
Windows (Trojanized Extension): A malicious VS Code extension masquerades as an official Claude Code plugin, executing PowerShell silently to bypass Defender and download additional payloads.
Impact: Over 15,600 victims have been documented, and the attackers are actively adapting by using new domains (e.g., Squarespace-hosted pages) when their sites are taken down.
"Contagious Interview" Campaign (Job-Themed Attack)
Vector: Attackers conduct fake, detailed technical interviews with software developers at reputable firms.
Method: Victims are convinced to download "assignments" or "coding tools" that actually contain malware.
Target: Developers at large enterprise solution providers and media firms are being targeted, with the goal of infiltrating corporate networks.
Recommendations for protection(below):
Verify downloads: Only download AI tools from official, verified vendors.
Beware of sponsored ads: Avoid clicking on "Sponsored" search results for popular tools; use direct URLs.
Inspect commands: Carefully review any command-line instructions (especially copy-pasted curl or chmod commands) from websites before running them.
Check vs code extensions: Verify the publisher of any vs Code extension before installation.
Monitor for IOCs: Check for unusual osascript activity on macOS or unexpected powershell.exe execution from Code.exe on Windows.
These campaigns are part of a broader trend of "malvertising" and social engineering that leverages the high demand for AI tools among developers to bypass traditional security measures.
https://www.microsoft.com/en-us/security/blog/2026/03/11/contagious-interview-malware-delivered-through-fake-developer-job-interviews/
mundophone

.webp)
.webp)




