Skip to main content
JS
Jacob Santos

Jacob Santos

Threat Hunter, Researcher and Builder

Sr. Threat Researcher | Trend AI
17
Articles
14
Threads
10+
Tools
10+
Talks
Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do
Trend Micro Research Apr 2026

Claude Code Packaging Error Remains a Lure in an Active Campaign: What Defenders Should Do

Social EngineeringSupply ChainCredential TheftAI Threats

Threat actors rapidly weaponized the public attention from Anthropic's Claude Code npm source map exposure, standing up a fake GitHub repository (leaked-claude-code/leaked-claude-code, operated by account idbzoomh1) to distribute trojanized 7z archives. The payloads bundled three distinct malware families: Vidar stealer for multi-threaded credential and wallet exfiltration via Steam and Telegram dead-drop C2 resolution, GhostSocks to convert infected Windows hosts into SOCKS5 residential proxy nodes, and PureLog Stealer as a fileless .NET infostealer executing entirely in-memory. The repository accumulated 838 stars and 1,060 forks, with at least 533 confirmed downloads of the most recent payload revision. The campaign is part of a broader rotating-lure operation active since February 2026 that has cycled through more than 25 software brands using a single Rust-compiled dropper. Defenders are advised to secure developer workstations with EDR behavioral protection, enforce zero-trust policies on shared code, restrict tools to licensed software, and rotate short-lived developer credentials.