Fake Claude Code Repos Push Vidar Infostealer on GitHub
Threat actors weaponized Anthropic's accidental source code leak to distribute Vidar malware through trojanized GitHub repos. Here's how the attack works.
Within 48 hours of Anthropic accidentally leaking Claude Code's source code, threat actors were already using fake GitHub repositories to push Vidar infostealer malware. The campaign ranks visibility high on Google Search, meaning developers searching for the leaked code are landing on malicious repos first.
On March 31, Anthropic published an npm package that inadvertently included a 59.8 MB JavaScript source map containing the full client-side codebase: 513,000 lines of unobfuscated TypeScript across 1,906 files. The leak exposed orchestration logic, permissions systems, and security internals.
How the Attack Works
Zscaler researchers identified a malicious GitHub repository published by user "idbzoomh" that advertises the leak as having "unlocked enterprise features" and no usage restrictions. The bait is effective—developers curious about Claude Code's internals or looking to bypass licensing restrictions are natural targets.
Users who download the repository receive a 7-Zip archive containing ClaudeCode_x64.exe. This Rust-based dropper deploys two payloads:
- Vidar: A commodity infostealer that harvests browser credentials, cookies, credit card data, and cryptocurrency wallet files
- GhostSocks: A network traffic proxying tool that routes attacker traffic through the victim's machine
The same threat actors have been running similar campaigns since February 2026, rotating through more than 25 different software brands as lures. Claude Code is just the latest hook.
Supply Chain Trust Exploitation
This attack pattern exploits the implicit trust developers place in source code. When a leak appears legitimate—especially from a major vendor like Anthropic—the instinct is to grab it before it disappears. That urgency bypasses normal caution.
We've documented similar tactics targeting TikTok and other platforms where threat actors exploit trending topics to distribute malware. The playbook is consistent: find something developers want, create convincing fakes, and SEO-optimize for maximum reach.
The rapid monetization of stolen credentials means compromised developers become enterprise risk vectors within hours. A single infected machine can expose corporate SSO tokens, cloud credentials, and internal system access.
Mitigation Steps
- Verify repository authenticity before downloading any "leaked" source code
- Treat downloaded executables with extreme suspicion, especially from unofficial repos
- Use sandboxed VMs for inspecting suspicious code
- Monitor endpoints for Vidar's known behavioral patterns
- Block known IOCs associated with this campaign
For organizations, this is a reminder that developer endpoints are high-value targets. Engineers typically have elevated access to source code, CI/CD systems, and cloud infrastructure. An infostealer on a dev machine can quickly cascade into a much larger incident.
Why This Matters
The speed here is striking. Anthropic's leak was accidental and relatively mundane—an oops in npm packaging. But within two days, adversaries had weaponized it into an active malware distribution campaign with professional SEO to maximize victims.
This is the new reality: any newsworthy event becomes an attack vector almost immediately. Security teams need to assume that trending topics—especially in developer communities—will be exploited, and brief employees accordingly.
If you're curious about Claude Code's internals, get them from Anthropic's official channels. The "unlocked" version on GitHub unlocks access to your credentials for threat actors.
Related Articles
SHub Reaper Stealer Hijacks macOS via AppleScript URL Scheme
SHub Reaper macOS infostealer bypasses Tahoe 26.4 defenses using applescript:// URLs, spoofs Apple, Google, and Microsoft to steal credentials and backdoor systems.
May 19, 2026PyPI Package With 1.1M Downloads Hijacked to Push Infostealer
Attackers compromised elementary-data version 0.23.3 on PyPI, pushing malicious code to 1.1 million monthly users. The infection extended to Docker images via automated workflows.
May 4, 2026NWHStealer Spreads via Fake Proton VPN Sites and Gaming Mods
Multiple campaigns distribute NWHStealer infostealer through counterfeit Proton VPN installers, gaming modifications, and YouTube-promoted downloads. Targets browser data and 25+ crypto wallets.
Apr 16, 2026Vidar Infostealer Spreads via Hacked WordPress Sites
Malwarebytes researchers detected a Vidar infostealer campaign using fake CAPTCHA pages on compromised WordPress sites. ClickFix technique tricks users into running malicious PowerShell.
Mar 28, 2026