Back to Feed
MalwareApr 13, 2026

Fake Claude Website Distributes PlugX RAT

Fake Claude website distributes PlugX RAT via trojanized installer using DLL sideloading.

Summary

A malicious website impersonating Anthropic Claude distributed a remote access trojan (PlugX) through a fake installer. The attack chain used a VBScript dropper to execute a legitimate G DATA antivirus updater (NOVUpdate.exe) for DLL sideloading while installing the real Claude app in the foreground. The infection self-cleaned to hide artifacts, establishing C&C connections to Alibaba Cloud infrastructure.

Full text

A website posing as a legitimate Anthropic Claude domain was caught serving a remote access trojan to its visitors, Malwarebytes reports. Relying on Claude’s popularity, a threat actor created a site that hosts a download link pointing to a ZIP archive allegedly containing a pro version of the LLM. The file contains an MSI installer that mimics the legitimate Anthropic installation chain and installs the real Claude application. When the user attempts to launch the Claude app via the Desktop shortcut created during the installation, however, a VBScript dropper runs the real app in the foreground while installing malware in the background, Malwarebytes explains. The VBScript drops three files in the startup folder, including NOVUpdate.exe, a signed G DATA antivirus updater abused for DLL sideloading to execute a PlugX malware variant. PlugX is a known remote access trojan (RAT) that has been used in various espionage campaigns for nearly a decade.Advertisement. Scroll to continue reading. Within seconds after being dropped, NOVUpdate.exe creates a TCP connection to its command-and-control (C&C) infrastructure on Alibaba Cloud. In addition to dropping files in the startup folder, the initial VBScript writes a batch file to delete itself and the script, hiding evidence of infection. The sideloading files in the startup folder and the NOVUpdate.exe process are the only artifacts that persist on the infected system. “The script also wraps the entire malicious payload section in an On Error Resume Next statement, silently swallowing any errors so that failures in the deployment do not produce visible error dialogs that might alert the victim,” Malwarebytes notes. The infection chain was seen in February in a phishing campaign relying on fake meeting invitations to infect recipients with PlugX malware. As Malwarebytes notes, while PlugX has been historically associated with Chinese espionage groups, its source code has been shared among threat actors, making attribution difficult. “What is clear is that the operators behind this campaign have combined a proven sideloading technique with a timely social engineering lure—exploiting the surging popularity of AI tools to trick users into running a trojanized installer,” Malwarebytes notes. Related: Industry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback Friday Related: Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit Related: China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation Related: Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Critical Marimo Flaw Exploited Hours After Public DisclosureGoogle Rolls Out Cookie Theft Protections in ChromeGoogle API Keys in Android Apps Expose Gemini Endpoints to Unauthorized AccessPalo Alto Networks, SonicWall Patch High-Severity VulnerabilitiesGoogle Warns of New Campaign Targeting BPOs to Steal Corporate Data300,000 People Impacted by Eurail Data BreachRCE Bug Lurked in Apache ActiveMQ Classic for 13 YearsFBI: Cybercrime Losses Neared $21 Billion in 2025 Latest News Gmail Brings End-to-End Encryption to Android and iOS for Enterprise UsersAdobe Patches Reader Zero-Day Exploited for MonthsIn Other News: Cyberattack Stings Stryker, Windows Zero-Day, China Supercomputer HackJuniper Networks Patches Dozens of Junos OS VulnerabilitiesIndustry Reactions to Iran Hacking ICS in Critical Infrastructure: Feedback FridayOrthanc DICOM Vulnerabilities Lead to Crashes, RCEChrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000MITRE Releases Fight Fraud Framework Trending Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: A Step-by-Step Approach to AI Governance April 28, 2026 With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveThe United States Department of War appointed David Vaughn as Technical Advisor for Data Infrastructure.Black Duck has named Dom Glavach as Chief Information Security Officer.Finite State has named Ann Miller as Vice President of Marketing.More People On The MoveExpert Insights The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin) Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor) The Human IOC: Why Security Professionals Struggle with Social Vetting Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb) Flipboard Reddit Whatsapp Whatsapp Email

Indicators of Compromise

  • malware — PlugX
  • malware — NOVUpdate.exe

Entities

Anthropic (vendor)Claude (product)G DATA (vendor)DLL sideloading (technology)