Cyber Criminals Expose Trade Secrets Through Counterfeit Code Installers

| 5 min read

Recent research from Ontinue has exposed a sophisticated infostealer campaign targeting developers through fraudulent Claude Code installation scripts. This revelation highlights a notable shift in tactics employed by cybercriminals, tapping into the growing dependence on popular coding tools while specifically concentrating on high-value targets such as developers and their sensitive information. The campaign capitalizes on trust—developers, often focused on productivity, may not scrutinize the setups of commonly used tools closely, potentially leaving their credentials vulnerable.

How the Attack Unfolds

At the core of this attack is a malicious command masquerading as a one-line installation script: “irm https[:]//claude[.]ai/install.ps1 | iex.” The bait, however, swaps the legitimate domain with one that leads to an attacker-controlled command. The use of the Internet Explorer 11 (IE) Elevator 2 COM interface is particularly notable. This interface, introduced by Google, is designed to bolster the App-Bound Encryption (ABE) system meant to safeguard sensitive user data like passwords and cookies from malicious entities. Since its introduction in January, the IElevator2 has aimed to curb past exploits that compromised browser security—a clear signal of how attackers innovate in response to defenses.

Finessing Detection Systems

Interestingly, Ontinue’s team observed that the attackers exploit a blind spot in typical security measures. When developers search for “install Claude Code,” they may unwittingly click on a sponsored link leading to a fraudulent page. This page doesn’t store the malicious instructions within the downloadable file but instead embeds them in the HTML, allowing it to evade detection by automated scanners and URL reputation services. This technique showcases how adversaries can adapt to existing security frameworks, presenting a significant challenge for defenders.

As the researchers state, "Automated scanners, URL reputation services, and any skeptical reviewer who simply curls the URL therefore observe clean PowerShell delivered from a Cloudflare-fronted domain bearing a valid Let’s Encrypt certificate.” Such tactics underscore the pressing need for security teams to adopt a more nuanced approach toward threat detection—one that goes beyond superficial examination of files and considers the underlying commands and scripts being executed.

Operational Details and Exfiltration Methods

The malware employed here boasts a unique operational design. After being executed through the compromised command, an obfuscated PowerShell loader activates. This loader injects a helper program into the active browser process, aiming to interact with the IElevator2 interface to retrieve ABE keys. With the possession of these keys, the malware can decrypt the browser’s databases, ultimately exfiltrating data such as cookies, passwords, and payment details back to an attacker-controlled server. They transmit this data in an encrypted “secure_prefs.zip” archive, further complicating detection efforts.

This reliance on legitimate browser functionalities raises alarming implications. The use of Chromium’s Mojo naming convention for naming inter-process communication (IPC) pipes indicates the sophisticated nature of this campaign. Rather than creating entirely novel methods, attackers have learned to manipulate existing security features to their advantage, creating a potential minefield for cybersecurity efforts.

Comparison to Existing Malware Families

Despite careful analysis, researchers found no technical match for this malware within known stealer families, except for Glove Stealer—a product of Gen Digital documented previously. The key distinction lies in the orchestration method; while Glove utilizes a helper module for communications, the current campaign uses a more streamlined approach with a single-purpose native helper positioned as an ABE oracle, which shifts all visible activity into PowerShell. This division complicates detection efforts, as behavioral rule sets that target only the native PE files are likely to overlook critical malicious activities happening at the COM call and PowerShell layers.

The Need for Evolving Defense Mechanisms

This campaign starkly illustrates the cat-and-mouse game of cybersecurity, where attackers continuously adapt while defenders scramble to keep pace. The instinct may be to consider this attack merely as another addition to the growing list of coding-related threats. However, that view oversimplifies the challenges faced by developers and security teams alike. As developers become unwitting targets of such sophisticated threats, the imperative for a robust and context-aware security posture has never been clearer. Organizations must consider adopting advanced heuristics and behavioral analytics to discern legitimate activity from malicious maneuvers effectively.

If you're working in the cybersecurity space, it’s critical to reevaluate the approaches taken towards monitoring development environments and to advocate for increased awareness among developers regarding the potential risks present in what may initially appear as reliable sources. The use of legitimate service interfaces by attackers warns us about the evolving nature of threats we face, demanding constant vigilance and proactive measures to mitigate risks in this landscape.