Fake Claude Code Repos Push Vidar Infostealer on GitHub
Threat actors weaponized Anthropic's accidental source code leak to distribute Vidar malware through trojanized GitHub repos. Here's how the attack works.
Within 48 hours of Anthropic accidentally leaking Claude Code's source code, threat actors were already using fake GitHub repositories to push Vidar infostealer malware. The campaign ranks visibility high on Google Search, meaning developers searching for the leaked code are landing on malicious repos first.
On March 31, Anthropic published an npm package that inadvertently included a 59.8 MB JavaScript source map containing the full client-side codebase: 513,000 lines of unobfuscated TypeScript across 1,906 files. The leak exposed orchestration logic, permissions systems, and security internals.
How the Attack Works
Zscaler researchers identified a malicious GitHub repository published by user "idbzoomh" that advertises the leak as having "unlocked enterprise features" and no usage restrictions. The bait is effective—developers curious about Claude Code's internals or looking to bypass licensing restrictions are natural targets.
Users who download the repository receive a 7-Zip archive containing ClaudeCode_x64.exe. This Rust-based dropper deploys two payloads:
- Vidar: A commodity infostealer that harvests browser credentials, cookies, credit card data, and cryptocurrency wallet files
- GhostSocks: A network traffic proxying tool that routes attacker traffic through the victim's machine
The same threat actors have been running similar campaigns since February 2026, rotating through more than 25 different software brands as lures. Claude Code is just the latest hook.
Supply Chain Trust Exploitation
This attack pattern exploits the implicit trust developers place in source code. When a leak appears legitimate—especially from a major vendor like Anthropic—the instinct is to grab it before it disappears. That urgency bypasses normal caution.
We've documented similar tactics targeting TikTok and other platforms where threat actors exploit trending topics to distribute malware. The playbook is consistent: find something developers want, create convincing fakes, and SEO-optimize for maximum reach.
The rapid monetization of stolen credentials means compromised developers become enterprise risk vectors within hours. A single infected machine can expose corporate SSO tokens, cloud credentials, and internal system access.
Mitigation Steps
- Verify repository authenticity before downloading any "leaked" source code
- Treat downloaded executables with extreme suspicion, especially from unofficial repos
- Use sandboxed VMs for inspecting suspicious code
- Monitor endpoints for Vidar's known behavioral patterns
- Block known IOCs associated with this campaign
For organizations, this is a reminder that developer endpoints are high-value targets. Engineers typically have elevated access to source code, CI/CD systems, and cloud infrastructure. An infostealer on a dev machine can quickly cascade into a much larger incident.
Why This Matters
The speed here is striking. Anthropic's leak was accidental and relatively mundane—an oops in npm packaging. But within two days, adversaries had weaponized it into an active malware distribution campaign with professional SEO to maximize victims.
This is the new reality: any newsworthy event becomes an attack vector almost immediately. Security teams need to assume that trending topics—especially in developer communities—will be exploited, and brief employees accordingly.
If you're curious about Claude Code's internals, get them from Anthropic's official channels. The "unlocked" version on GitHub unlocks access to your credentials for threat actors.
Related Articles
Vidar Infostealer Spreads via Hacked WordPress Sites
Malwarebytes researchers detected a Vidar infostealer campaign using fake CAPTCHA pages on compromised WordPress sites. ClickFix technique tricks users into running malicious PowerShell.
Mar 28, 2026Fake VS Code Security Alerts Flood GitHub to Spread Malware
Attackers are posting thousands of fake Visual Studio Code vulnerability alerts in GitHub Discussions, using fabricated CVEs and urgent language to trick developers into downloading malware.
Mar 27, 2026Attackers Use Bing AI Search to Distribute GhostSocks Malware
Malicious GitHub repositories exploiting Bing AI search results to distribute infostealers and GhostSocks proxy malware. Fake OpenClaw installers turn victims into residential proxies.
Mar 5, 2026Infostealers Now Targeting AI Agent Configurations
Hudson Rock detects Vidar infostealer exfiltrating OpenClaw AI agent files for the first time. Stolen configs include gateway tokens and cryptographic keys.
Feb 17, 2026