• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Artificial Intelligence

Leaked & Exploited Claude Code Distributes Infostealer Malware On GitHub

Akinola Ajibola by Akinola Ajibola
April 3, 2026
in Artificial Intelligence
Share on FacebookShare on Twitter

In order to spread Vidar information-stealing malware, threat actors are taking advantage of the recent Claude Code source code breach by creating phony GitHub repositories.

Threat actors are now employing phony GitHub repositories and malicious Google Ads to spread infostealer malware that poses as “leaked” or “unlocked” versions of Claude Code in the wake of Anthropic’s enormous unintentional source code leak on March 31, 2026.

Claude Code is an Anthropic terminal-based AI agent that is capable of direct system contact, LLM API call processing, MCP integration, and permanent memory. It is intended to carry out coding activities directly in the terminal and function as an autonomous agent.

Last Tuesday, March 31st, Anthropic unintentionally included a 59.8 MB JavaScript source map in the published npm package, exposing the whole client-side source code of the new tool.

Attackers are exploiting the Claude Code leak to trick developers into installing malware. They use fake websites, GitHub repos, and Google ads to deliver info-stealers (Vidar, Amatera, AMOS) and proxy malware (GhostSocks). A separate npm supply chain attack on the axios package on March 31 may have also compromised users.

The breach included 1,906 files with 513,000 lines of unobfuscated TypeScript that exposed the agent’s execution systems, rights, orchestration logic, hidden features, development information, and security-related internals.

Many others quickly downloaded the leaked code, which was then posted on GitHub and forked thousands of times.

The disclosure gave threat actors a chance to distribute the Vidar infostealer to people searching for the Claude Code leak, according to a report from cloud security firm Zscaler.

The researchers discovered that a fraudulent GitHub repository created by user “idbzoomh” posted a phony leak and promoted it as having no usage limitations and “unlocked enterprise features.”

The repository is tailored for search engines and appears among the top results on Google Search for phrases like “leaked Claude Code” in order to increase traffic to the fake leak.

The researchers claim that inquisitive individuals download a 7-Zip file containing ClaudeCode_x64.exe, a Rust-based executable. The dropper launches the GhostSocks network traffic proxying tool and Vidar, a commodity information stealer.

Zscaler found that the malicious archive is often updated, indicating that future iterations might include additional payloads.

A second GitHub repository with the same code was also discovered by the researchers; however, at the time of study, it displayed a “Download ZIP” button. According to Zscaler, it is run by the same threat actor who probably tests different distribution methods.

GitHub has frequently been exploited to disseminate malicious payloads that are disguised in different ways, despite the platform’s protections.

Threat actors used repositories purporting to include proof-of-concept (PoC) exploits for recently discovered vulnerabilities to target novice researchers or cybercriminals in campaigns in late 2025.

In the past, attackers were eager to take advantage of well-publicized incidents in the hopes of making advantageous concessions.

Additional details to this show that the leak wasn’t a hack and that it was Anthropic’s packaging mistake. They accidentally included a 60MB source map file in an npm package, exposing ~512,000 lines of TypeScript code. Within hours, the code spread worldwide, was analyzed, and rewritten in other languages to evade DMCA takedowns.

Avoid unofficial “leaked” Claude Code repositories that don’t download, fork, or run anything from them. Stick to Anthropic’s official site or verified npm page for installation. If you touched any suspicious repos on March 31, 2026, rotate all your API keys and credentials immediately.

Related Posts:

  • claude code leak
    Claude Code Leak Raises Bigger Question; Can AI…
  • Claude-Code
    Claude Code Source Leak Hints at ‘Proactive’ Mode…
  • anthropic
    Anthropic’s Claude Opus 4.6 Debuts 1M-Token Context
  • 2-1758799815688
    Microsoft Integrates Anthropic’s Claude AI Into Copilot
  • Screenshot 2024-10-03 at 15.34.40
    GitHub Copilot Surpasses 15 Million Users
  • Apple-Xcode-agentic-coding-hero
    Apple Adds Claude and OpenAI Codex to Xcode for…
  • claude marketplace
    Anthropic unveils Claude Marketplace to centralize…
  • Gemini-Gems-cover
    Google Gemini Advanced Users Can Now Link to GitHub

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: AIclaude code leakcodegithub
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Flutterwave Gets Banking License To Take On Nigerian Banks April 3, 2026
  • OpenAI Makes First Media Bet With Acquisition of Tech Talk Show TBPN April 3, 2026
  • Cisco Patches Critical Flaws That Could Let Hackers Take Over Systems Without Login April 3, 2026
  • Sony’s PlayStation Unit Buys Cinemersive Labs to Push AI-Powered 3D Visuals April 3, 2026
  • A Five-Year-Old AGI Test Just Beat AI and Exposed a Hard Truth April 3, 2026
  • Leaked & Exploited Claude Code Distributes Infostealer Malware On GitHub April 3, 2026
  • RSAC 2026: AI Agents Are Flooding Security Tools, But A Visibility Gap Remains April 2, 2026
  • Claude Code Source Leak Hints at ‘Proactive’ Mode and Experimental Features at Anthropic April 2, 2026
  • SpaceX Reportedly Files Confidentially for IPO Aimed at Record $1.75 Trillion Valuation April 2, 2026
  • Google Patches Fourth Chrome Zero-Day of 2026 as Attacks Keep Coming April 2, 2026
  • CBN Orders Nigerian Banks And Fintechs To Self‑Audit Cybersecurity Defences April 2, 2026
  • CBN Launches Crypto AML Pilot With Flutterwave, Paystack and Other VASPs April 2, 2026

Browse Archives

April 2026
MTWTFSS
 12345
6789101112
13141516171819
20212223242526
27282930 
« Mar    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.