⚠️ Fake Claude AI! Trojan Risks Windows 🚨

May 07, 2026 |

Tech

🎧 Audio Summaries
English flag
French flag
German flag
Japanese flag
Korean flag
Mandarin flag
Spanish flag
🛒 Shop on Amazon

🧠Quick Intel


  • A fake Claude AI website is distributing a malicious Claude-Pro Relay download containing a previously undocumented Windows backdoor named Beagle.
  • The malicious archive, ‘Claude-Pro-windows-x64.zip’ (505MB), deploys three files to the Startup folder: NOVupdate.exe, NOVupdate.exe.dat, and avk.dll.
  • Running the binary installs a trojanized copy of Claude that utilizes PlugX malware, granting attackers remote access to the system.
  • The initial payload is DonutLoader, previously used in attacks targeting government organizations in Southeast Asia in 2024, which deploys the Beagle backdoor into system memory.
  • The Beagle backdoor communicates with a C2 at ‘license[.]claude-pro[.]com’ (IP address 8.217.190[.]58, Alibaba-Cloud service) using TCP port 443 and/or UDP port 8080 with an AES key.
  • Samples related to Beagle were submitted to VirusTotal between February and April this year, utilizing different attack chains including Microsoft Defender binaries and AdaptixC2 shellcode.
  • The campaign mimics legitimate Claude AI website appearances, including similar colors and fonts, but with broken links redirecting to the front page.
  • 📝Summary


    A cybersecurity firm, Sophos, reported a deceptive website mimicking the Claude AI platform offered a malicious download, a Windows backdoor named Beagle. The fake site, resembling the legitimate Claude-Pro Relay service, directed users to a 505MB archive containing an MSI installer. Running this installer deployed three files, including an updater and a DLL, ultimately installing a PlugX malware chain. Researchers identified DonutLoader, previously used against Southeast Asian government organizations, as the initial payload, deploying the Beagle backdoor. This backdoor communicated via TCP and UDP, utilizing an AES key and an Alibaba-Cloud hosted command-and-control server. Samples of the Beagle backdoor were detected between February and April, utilizing various attack chains and impersonating security vendors.

    💡Insights



    CLAUDERELAY: A DEEP DIVE INTO A FAKE AI RELAY AND ITS MALICIOUS BACKDOOR
    The cybersecurity firm Sophos has uncovered a sophisticated, albeit simplistic, phishing campaign targeting Claude-Code developers. The operation centers around a fake website, claude-pro[.]com, designed to mimic the legitimate Claude AI platform. This deceptive site offers a malicious download – a 505MB archive named ‘Claude-Pro-windows-x64.zip’ – containing an MSI installer for a purported “Claude-Pro Relay” service. Researchers determined that clicking the download button leads users to execute a trojanized version of Claude, which, while functioning as intended initially, secretly deploys a PlugX malware chain, granting attackers remote access to compromised systems. The initial discovery of this threat was made by Malwarebytes, who identified the ‘Pro’ installer as a malicious payload. This highlights the evolving tactics employed by cybercriminals to exploit popular AI tools and the importance of vigilance within the developer community.

    THE BEAGLE BACKDOOR: A LAYERED ATTACK
    Upon execution, the ‘Claude-Pro’ installer adds several files to the Windows Startup folder: NOVupdate.exe, NOVupdate.exe.dat, and avk.dll. Sophos’s investigation revealed that NOVupdate.exe is a signed updater for G Data security solutions, cleverly used to sideload the malicious avk.dll and the encrypted NOVupdate.exe.dat file. This technique – utilizing a legitimate security update mechanism to deliver malware – is a common tactic employed by attackers. The avk.dll acts as a decryption and in-memory execution engine for the payload within NOVupdate.exe.dat, which is the open-source DonutLoader injector. DonutLoader, previously identified by Sophos in attacks targeting Southeast Asian government organizations in 2024, is designed to evade detection by deploying the Beagle backdoor directly into system memory. The Beagle backdoor itself is a relatively simple command-and-control interface, offering commands such as uninstall, execute, upload, download, create directory, rename, list directory contents, and remove directory. Crucially, communication between the infected system and the attacker's command-and-control (C2) server occurs via TCP over port 443 and/or UDP over port 8080, protected by a hardcoded AES key. The C2 server’s IP address – 8.217.190[.]58 – is associated with the Alibaba-Cloud service, further suggesting the attacker's infrastructure.

    MULTIPLE ATTACK CHANNELS AND MITIGATION STRATEGIES
    Sophos discovered multiple samples related to the Beagle backdoor submitted to VirusTotal between February and April of this year, utilizing the same XOR decryption key. These samples employed diverse attack chains, including Microsoft Defender binaries, AdaptixC2 shellcode, and decoy PDF files, and impersonated update sites from multiple security vendors (CrowdStrike, SentinelOne, and Trellix). While Sophos couldn't definitively attribute the campaign to a specific threat actor, the researchers suspect operators behind the PlugX malware campaign are experimenting with this new payload. To mitigate this risk, users are advised to download Claude exclusively from the official portal and to scrutinize sponsored search results. The presence of ‘NOVupdate’ files on a system is a strong indicator of compromise. Furthermore, awareness of evolving attack techniques and proactive security measures are paramount in safeguarding AI development environments. Consider attending the Autonomous Validation Summit (May 12 & 14) to learn how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.