CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership

'InstallFix' Attacks Spread Fake Claude Code Sites

Dark Reading Archived Mar 16, 2026 ✓ Full text saved

A fresh cyberattack campaign blends malvertising with a ClickFix-style technique that highlights risky behavior with AI coding assistants and command-line interfaces.

Full text archived locally
✦ AI Summary · Claude Sonnet


    СLOUD SECURITY APPLICATION SECURITY CYBER RISK VULNERABILITIES & THREATS NEWS 'InstallFix' Attacks Spread Fake Claude Code Sites A fresh cyberattack campaign blends malvertising with a ClickFix-style technique that highlights risky behavior with AI coding assistants and command-line interfaces. Rob Wright,Senior News Director,Dark Reading March 9, 2026 4 Min Read SOURCE: RALF LIEBHOLD VIA ALAMY STOCK PHOTO A new variation of the ClickFix technique is capitalizing on the popularity of Anthropic's Claude Code and other AI coding tools. Researchers at Push Security discovered the threat campaign, which combines malvertising with a social engineering attack. The research team found fake install pages for Claude Code were spreading exclusively through Google-sponsored links for searches such as "Claude Code," "Claude Code install," and "Claude Code CLI." The cloned installation pages for Anthropic's coding assistant are near-identical to the real thing, Jacques Louw, Push Security co-founder and chief product officer (CPO), explained in a blog post published Friday. But when victims copy the malicious install commands from the clones sites, they deploy the Amatera Stealer malware, which could swipe developers' credentials and give attackers access to enterprise development environments. While there's nothing revolutionary about this approach, which Push Security calls "InstallFix," Louw explained that attackers have recognized the increased tendency among users to simply copy and paste commands into their systems and execute them. The attacks highlight an insecure practice that has, unfortunately, become the norm these days. Related:Most Google Cloud Attacks Start With Bug Exploitation "There was a time, not that long ago, when pasting a command from a website straight into your terminal was something you'd only try once before some grizzled senior engineer beat it out of you," Louw wrote. "That's because you're effectively handing a website a blank cheque to execute whatever it wants on your system." ClickFix & CLI Tools Make a Dangerous Match  ClickFix is a widely used social engineering technique that typically delivers error messages of some kind to convince unsuspecting users to execute malicious commands. The error messages typically feature fake browser updates, but variations of the technique have used everything from phony Blue Screens of Death to audio errors for fake job interviews conducted over videoconferencing. InstallFix, however, might be the most apt variant yet because it targets a class of user that's probably comfortable with copying and pasting commands. Like many AI coding assistants, Louw explained, Anthropic's recommended install method for Claude Code is pasting and executing a one-line command in a system terminal. And it's not just AI-coding assistants; Louw wrote that hundreds of the most popular developer and command-line interface (CLI) tools ship with the same installation instructions. Attackers know that this has become a standard practice and are now exploiting it. Related:VMware Aria Operations Bug Exploited, Cloud Resources at Risk "The entire security model boils down to "trust the domain." And with AI adoption encouraging more non-technical users to work with the kind of tools that only devs used to use, this suddenly becomes a threat to a much larger, less security conscious pool of users," Louw wrote. Capitalizing on Claude Code According to Push Security, malicious Google ads are an ideal delivery mechanism because, unlike phishing emails, the malicious links won't be caught by email security scans. Plus, the attackers are taking advantage of the increasing interest in Claude Code with the sponsored search results, which appear above organic search results and could fool users who quickly click on a link without realizing it's an ad. While the InstallFix campaign may seem like it's tailored to take advantage of shadow AI adoption and inexperienced coders, Louw tells Dark Reading that's not necessarily the case. The threat actors behind the campaign are targeting a mainstream AI tool that are likely in use already in many organizations, and the risky path a user takes to install the tool, he says. The scheme can affect both experienced developers and amateur vibe-coders. "I suspect this campaign is targeting Claude Code specifically, because it's one of the tools (if not the tool) being adopted the fastest across the board," he says. "This is mirrored by the high rate of new account creations we see across our customers for Anthropic products." Related:AI Agent Overload: How to Solve the Workload Identity Crisis Push Security warned that in addition to abusing Google's sponsored links, the threat actors behind the InstallFix attacks are using domains from legitimate providers such as Cloudflare Pages, Tencent EdgeOne, and Squarespace, which appear innocuous and blend in with normal traffic activity. Louw said such abuse has been a common theme that Push Security has observed across virtually every phishing site and malicious link these days. Users should be extremely cautious when copying and pasting commands into their terminals and should take additional time to verify that the domains providing such commands are in fact authentic. While Push Security provided indicators of compromise (IoCs) for the InstallFix attacks, Louw said the data has limited value because domains for campaigns like this one tend to have a short lifespan. "This is a fast-moving situation, with domains constantly being spun up," he wrote. About the Author Rob Wright Senior News Director, Dark Reading Rob Wright is a longtime reporter with more than 25 years of experience as a technology journalist. Prior to joining Dark Reading as senior news director, he spent more than a decade at TechTarget's SearchSecurity in various roles, including senior news director, executive editor and editorial director. Before that, he worked for several years at CRN, Tom's Hardware Guide, and VARBusiness Magazine covering a variety of technology beats and trends. Prior to becoming a technology journalist in 2000, he worked as a weekly and daily newspaper reporter in Virginia, where he won three Virginia Press Association awards in 1998 and 1999. He graduated from the University of Richmond in 1997 with a degree in journalism and English. A native of Massachusetts, he lives in the Boston area.  More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Cybersecurity Forecast 2026 The ROI of AI in Security ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars You May Also Like СLOUD SECURITY Fake AI Chrome Extensions Steal 900K Users' Data by Alexander Culafi JAN 08, 2026 СLOUD SECURITY Critical 'MongoBleed' Bug Under Attack, Patch Now by Jai Vijayan, Contributing Writer JAN 05, 2026 СLOUD SECURITY Silk Typhoon Attacks North American Orgs in the Cloud by Nate Nelson, Contributing Writer AUG 22, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Editor's Choice CYBERSECURITY OPERATIONS Why Stryker's Outage Is a Disaster Recovery Wake-Up Call byJai Vijayan MAR 12, 2026 5 MIN READ APPLICATION SECURITY Microsoft Patches 83 CVEs in March Update byJai Vijayan MAR 11, 2026 4 MIN READ THREAT INTELLIGENCE Commercial Spyware Opponents Fear US Policy Shifting byRob Wright MAR 12, 2026 9 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST AI-Powered Threat Detection: Beyond Traditional Security Models WED, MARCH 25, 2026 AT 1PM EST More Webinars White Papers Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗