Fake Claude AI installer pages are tricking users into running malware


Hackers are using fake Claude AI installer pages to trick Windows and macOS users into running malware commands on their own systems. The campaign, known as InstallFix, targets people searching for Claude Code installation instructions and uses sponsored search results to make malicious pages look trustworthy.

The attack does not rely on a software vulnerability. It relies on users copying and running commands from a page that looks like official documentation. Once the command runs, the system starts a multi-stage infection chain that can collect system data, disable security protections, create persistence, and connect to attacker-controlled servers.

Trend Micro says the campaign has targeted organizations in the United States, Malaysia, the Netherlands, and Thailand. Observed industries include government, education, electronics, and food and beverage.

How the fake Claude installer attack works

The campaign begins when users search for terms such as Claude Code or Claude Code install. Attackers place sponsored search results that lead to fake installation pages designed to resemble real Claude documentation.

The page detects or presents instructions for the visitor’s operating system. Windows users receive commands that abuse legitimate Windows tools, while macOS users see terminal-style instructions that appear normal for developer tools.

This makes the lure effective against both technical and non-technical users. Developers often expect command-line installation steps, while less experienced users may trust the instructions because the result came from a sponsored search placement.

At a glance

ItemDetails
Campaign nameInstallFix, also called the Fake Claude Installer threat
Main lureFake Claude AI and Claude Code installation pages
Distribution methodSponsored search results and malvertising
TargetsWindows and macOS users searching for Claude Code setup instructions
Initial executionUser runs a command copied from the fake page
Observed impactSystem profiling, security bypass attempts, persistence, data theft, and command-and-control activity
Reported regionsUnited States, Malaysia, Netherlands, and Thailand

Why the campaign is convincing

Claude Code is a legitimate developer tool, and its real installation process can involve command-line steps. Attackers exploit that expectation by copying the look of documentation pages and replacing trusted commands with malicious ones.

The fake pages use the same habit many developers already follow: copy a command, paste it into Terminal or PowerShell, and press Enter. That habit becomes dangerous when users trust the wrong page.

Some fake pages also use links and layouts that make the site look more credible. The URL is often the only clear warning sign, and many users do not check it closely before running a command.

What happens on Windows systems

On Windows, Trend Micro observed PowerShell invoking mshta.exe to download and execute a malicious payload disguised as claude.msixbundle. Mshta.exe is a legitimate Microsoft utility, but attackers often abuse it to run remote HTML application payloads.

Fraudulent landing page (Source – Trend Micro)

The downloaded file uses a deceptive package format and hides script execution behind what appears to be an installer. The infection chain then launches obfuscated commands and continues loading the next stages.

The malware can create a unique victim identifier by hashing the computer name and username. It then uses that identifier to build a victim-specific command-and-control URL, which makes broad blocking harder for defenders.

What happens after infection

StageWhat the attacker doesSecurity impact
Initial accessUses sponsored results to send users to a fake Claude installer pageBypasses normal suspicion through familiar branding
Command executionTricks users into running OS-specific commandsTurns the user into the execution step
Payload deliveryDownloads a disguised package or script from attacker infrastructureStarts a multi-stage infection chain
EvasionUses obfuscation, fileless execution, and security bypass techniquesMakes detection and analysis harder
PersistenceCreates scheduled tasks or similar mechanismsAllows malware to survive reboots
Command and controlConnects to attacker-controlled servers for more instructionsGives attackers a path for further payloads and data theft

Why developers face higher risk

Developers often install tools from documentation pages and run setup commands in terminals. That normal workflow creates an opening for attackers who can clone documentation and buy search ads.

The risk also extends beyond the infected device. A developer workstation may hold source code, API keys, SSH keys, cloud sessions, browser tokens, package manager credentials, and access to internal repositories.

If an infostealer reaches those assets, attackers may move from one infected workstation to cloud systems, code repositories, CI/CD pipelines, and internal applications.

Observed indicators from the campaign

Indicator typeIndicatorContext
Domaindownload-version[.]1-5-8[.]comUsed to host the fake claude.msixbundle payload
Domainoakenfjrod[.]ruCommand-and-control domain using victim-specific subdomains
File nameclaude.msixbundleMalicious payload disguised as a Claude AI installer
File nameClaude.msixbundle.zipArchive containing an obfuscated script payload
SHA2562f04ba77bb841111036b979fc0dab7fcbae99749718ae1dd6fd348d4495b5f74Hash tied to a recovered later-stage payload
IP address104[.]21[.]0[.]95Outbound command-and-control activity observed during analysis
IP address185[.]177[.]239[.]255Outbound command-and-control activity observed during analysis
IP address77[.]91[.]97[.]244HTTPS traffic observed during analysis

Why sponsored search results create trust

Many users assume a sponsored search result has passed a stronger trust check. That assumption gives attackers an advantage when they impersonate popular AI tools.

Google’s advertising policies prohibit malware and attempts to trick or bypass review systems, but malicious campaigns still appear when attackers abuse advertiser accounts, redirects, compromised infrastructure, or convincing landing pages.

Stages of the infection chain (Source – Trend Micro)

This means users and companies cannot rely on search placement alone. The safer approach is to visit official vendor pages directly, bookmark trusted documentation, and avoid running commands from ads or unfamiliar domains.

How organizations can reduce risk

  • Block known malicious domains and IP addresses from the campaign.
  • Use DNS filtering to block newly registered and suspicious domains.
  • Restrict mshta.exe where business operations do not require it.
  • Monitor PowerShell, Terminal, curl, bash, and mshta.exe activity for unusual download behavior.
  • Train users to avoid running install commands from sponsored search results.
  • Tell developers to use official vendor documentation, package registries, and verified repositories.
  • Review browser-stored credentials, cookies, API keys, and developer tokens after suspected infection.
  • Use endpoint detection rules for scheduled task creation after suspicious command execution.

What users should do before installing Claude Code

Users should go directly to the official Claude Code documentation or trusted package sources before installing the tool. They should also check the domain carefully before copying any command into a terminal or command prompt.

When possible, users should prefer known package managers or vendor-published installation methods instead of commands from search ads. They should also read the command before running it, especially if it downloads and executes a remote script.

Organizations should publish approved internal instructions for installing AI developer tools. This reduces the chance that employees will search the web and land on a malicious clone.

FAQ

Are Windows and macOS users both targeted?

Yes. Researchers observed fake installer instructions for both Windows and macOS users.

What is the fake Claude installer campaign?

It is a malvertising and social engineering campaign that uses fake Claude AI or Claude Code installer pages to trick users into running malware commands.

What is InstallFix?

InstallFix is a social engineering method where attackers clone software installation pages and replace legitimate setup commands with malicious ones.

Does the attack exploit a Claude vulnerability?

No. The campaign abuses trust in Claude branding and developer installation habits. The infection starts when a user runs commands from a fake page.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages