• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Attackers & Hackers Use Google Ads & Claude.AI Chats To Spread Mac Malware

Akinola Ajibola by Akinola Ajibola
May 11, 2026
in Security
Share on FacebookShare on Twitter

There have been several users searching for “Claude Mac download” who may have encountered sponsored results that display claude.ai as the intended destination but instead direct them to instructions advising them to install malware on their Macs.

Security researchers found that the attack chains target developers and AI enthusiasts directly, avoiding typical domain verification safety checks. 

As shared, Claude Chats turned into weapons against macOS users, whose operation was uncovered by Berk Albayrak, a security engineer at Trendyol Group, who detailed his findings on LinkedIn.

Albayrak had discovered that a shared chat on Claude.ai was posing as an official “Claude Code on Mac” installation guide that had been attributed to “Apple Support.” The chat walks some users through opening Terminal and pasting a command that quietly downloads and runs malware on their Mac.

While attempting to verify Albayrak’s findings, members of a press team had found out that a second shared Claude chat was executing the same attack using entirely different infrastructure. And both chats follow an identical structure and social engineering approach but utilize different domains and payloads. At the time of writing, both chats remained publicly accessible.

How does the macOS malware work?

The Base64 instructions had shown in the shared Claude chat download an encoded shell script from domains such as

  • In the variant observed by Albayrak [VirusTotal]: 

hxxp://customroofingcontractors[.]com/curl/b42a0ed9d1ecb72e42d6034502c304845d98805481d99cea4e259359f9ab206e

  • In the variant observed by members of the press [VirusTotal]: 

hxxps://bernasibutuwqu2[.]com/debug/loader.sh?build=a39427f9d5bfda11277f1a58c89b7c2d

The ‘loader.sh’ file that was delivered via the second link above is said to contain another set of gunzip-compressed shell instructions. This compressed script runs entirely in memory, leaving little obvious trace on the user’s system disk.

Members of the press observed that the server delivered a unique and unclear version of the payload with each request, a method known as polymorphic delivery, making it harder for security tools to flag the download based on a known hash or signature.

The variant identified by members of the press begins by checking whether the machine has keyboard input sources set to Russian or from CIS countries. If so, the script exits without taking action while it quietly sends a “cis_blocked” status ping to the attacker or hacker’s server. However, only systems that pass through this check can proceed to the next stage.

Before continuing, the script is said to also collect the user’s external IP address, hostname, OS version, and keyboard locale, sending all of this data back to the attacker. This profiling before payload delivery suggests the operators have been strategically selected for their targets.

Further to this, the script also downloads a second-stage payload and executes it using osascript, macOS’s native scripting engine. This grants the attacker remote access to code execution without ever needing to drop a traditional application or binary file.

However, the variant, which was identified by Albayrak, appears to skip the profiling steps and goes straight into the execution phase. It gathers browser information such as credentials, cookies, and macOS Keychain contents; packages them up; and tends to send them to the attacker’s server. Albayrak identified this as a variant of the MacSync macOS infostealer.

The briskinternet[.]com domain seen in the Albayrak variant appeared to be offline as of the press documenting this.

Malvertising has become a recurring method for distributing malware.

Also, the members of the press had previously covered similar campaigns targeting users searching for software like GIMP, where a convincing Google ad would display a legitimate-looking domain but redirect visitors to a lookalike phishing site.

This campaign flips that model, as there is no fake domain to detect. Both Google ads seen here point to Anthropic’s real domain, claude.ai, because the attackers are hosting their malicious instructions inside Claude’s own shared chat feature. The destination URL in the ad is genuine.

This is not the first time attackers have abused AI platform-shared chats in this way. In December, the press also had reported on a similar campaign targeting ChatGPT and Grok users.

Earlier this year, threat actors ran an identical campaign aimed at macOS developers searching for Homebrew, a popular package manager. However, targeting Claude casts a much wider net, reaching non-technical users who may simply be curious about AI and are less likely to scrutinize a terminal command before running it.

Users should navigate directly to claude.ai to download the native Claude app, rather than clicking sponsored search results. The legitimate Claude Code CLI is available through Anthropic’s official documentation and does not require pasting commands from a chat interface.

As a general rule, users should treat any instructions that ask them to paste terminal commands with caution, no matter where those instructions appear to come from.

The press also reached out to Anthropic and Google for comment prior to publication.

To mitigate the threats so far, users should skip sponsored results by never clicking on Google search ads for software installation and instead navigate manually to the official domain, such as typing claude.ai directly. 

Additionally, users should be able to verify the URL path: even if a domain is legitimate, check whether the full link points to a user-generated asset like “/share/” or an external landing page such as a Squarespace subdomain. It is also critical to ban untrusted terminal execution by avoiding running unexpected curl or base64 pipe-to-shell commands provided by AI prompts or unofficial troubleshooting pages. 

Finally, system administrators should implement network restrictions, including wildcard blocks on identified attacker domains such as *.official-version[.]com and a2abotnet[.]com.

Related Posts:

  • claude code1
    Leaked & Exploited Claude Code Distributes…
  • claude_bmhd
    Anthropic’s Claude AI Suffers Global Outage,…
  • claude marketplace
    Anthropic unveils Claude Marketplace to centralize…
  • anthropic1
    Anthropic’s Claude Gains Computer Control
  • claude-mac-app
    Claude Memory Rolls Out to Free Tier as Anthropic…
  • claude chatgpt
    Claude Beats ChatGPT On Google Play, Reaching 1M Daily Users
  • 2-1758799815688
    Microsoft Integrates Anthropic’s Claude AI Into Copilot
  • Claude-Code
    Claude Code Source Leak Hints at ‘Proactive’ Mode…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: Albayrakclaude aigoogle adsmalware
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Google DeepMind Is Turning the Mouse Pointer into an AI Assistant May 14, 2026
  • Amazon Spins Up A Shopping‑First Version Of Alexa For All US Customers May 13, 2026
  • Data and Fintech Lift MTN Rwanda Back to Profit in Q1 2026 May 13, 2026
  • Perceptron Mk1 AI Model Shakes Up Video Analysis Market with Massive Cost Advantage May 13, 2026
  • Google’s Gemini-powered ‘Rambler’ Dictation comes to Gboard, Raising Pressure on Voice Startups May 12, 2026
  • ‘Daybreak’: OpenAI Launches Cybersecurity Push to Rival Anthropic’s Glasswing May 12, 2026
  • Google Links First-Ever Zero-Day Discovery to AI-Assisted Hacking May 12, 2026
  • Googlebooks: Google’s Android-Powered AI Laptops Are Coming This Year May 12, 2026
  • TikTok Launches In-App Travel Booking Service ‘TikTok GO’ in the US May 12, 2026
  • GitLab Opens Voluntary Layoffs as It Reshapes for AI Era May 12, 2026
  • Instructure Reaches Deal With Hackers After Twin Breaches Of Canvas Platform May 12, 2026
  • TikTok Rolls Out Ad-Free Subscription Plan In UK May 11, 2026

Browse Archives

May 2026
MTWTFSS
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.