Close Menu
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Trending

CleanSpark CTO says misinformation is driving the anti-data center hysteria

May 11, 2026

Tracking Adolescents’ Susceptibility to Misinformation in the Digital Age

May 11, 2026

'We've not done well on the propaganda war': PM attributes drop in support from Israel in US to social media disinformation – The Times of Israel

May 11, 2026
Facebook X (Twitter) Instagram
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Subscribe
Web StatWeb Stat
Home»AI Fake News
AI Fake News

Fake Claude AI Site Drops Beagle Backdoor on Windows Users

News RoomBy News RoomMay 7, 2026Updated:May 11, 20266 Mins Read
Facebook Twitter Pinterest WhatsApp Telegram Email LinkedIn Tumblr

It seems an alarming new digital threat has emerged, preying on the trust users place in artificial intelligence tools. Picture a scenario where you’re excited to try out Anthropic’s Claude, a cutting-edge AI, but instead of landing on their official website, you stumble upon a sophisticated impostor. This isn’t just a simple mistake; it’s a meticulously crafted trap designed to trick you into downloading something far more sinister than an AI assistant. This fake website, claude-pro[.]com, looks deceptively real, albeit a bit stripped down, and promises an exclusive tool called “Claude-Pro Relay.” Unbeknownst to the user, this seemingly beneficial software is actually a Trojan horse, hiding a newly discovered backdoor known as “Beagle.”

The malicious journey begins when an unsuspecting user downloads what they believe to be the “Claude-Pro Relay” – a rather hefty ZIP archive, weighing in at around 505 MB. Once downloaded and opened, this archive doesn’t just install a new AI tool; it initiates a complex and stealthy infection process. It cleverly leverages a technique called DLL sideloading, exploiting a legitimate software component to inject its harmful payload. In this case, the attackers are abusing a signed antivirus updater binary from G DATA, a well-known security company. This means the malware is essentially piggybacking on a trusted program, making it much harder for traditional security measures to detect. The Sophos X-Ops team, who meticulously uncovered this scheme, noted that this sophisticated attack infrastructure has been brewing since at least March 2026, indicating a long-term, carefully planned operation rather than a spur-of-the-moment attack.

The downloaded ZIP archive contains an MSI installer, which is a standard Windows installation package. This installer isn’t delivering AI magic, however. Instead, it discreetly places three crucial files into your computer’s startup folder. First, there’s a legitimate G DATA antivirus updater, cunningly renamed “NOVupdate.exe.” Second, an encrypted data file, a seemingly innocuous blob of information. And finally, the star of the show, a malicious DLL named “avk.dll.” The insidious part of this attack chain is how it weaponizes trust. When the genuine G DATA updater program, “NOVupdate.exe,” starts up, it expects to load its own legitimate libraries. But because of the attacker’s clever manipulation, it inadvertently loads the malicious “avk.dll” instead. This is the essence of DLL sideloading – tricking a trusted application into executing malicious code, all while flying under the radar of security software that trusts the original application.

Once the “avk.dll” is loaded, the real mischief begins. This malicious DLL is designed to decrypt the aforementioned encrypted data file. It does this using a reversed XOR key, a simple yet effective encryption method. The result of this decryption is a piece of shellcode, a small program designed to perform a specific task. This shellcode then takes another step in the infection chain, loading something called DonutLoader. DonutLoader is an open-source, in-memory loader, meaning it can load other malicious code directly into the computer’s memory, avoiding writing it to disk where it might be easily detected. Finally, DonutLoader deploys the ultimate objective of this elaborate scheme: the “Beagle” backdoor. Initially, the researchers at Sophos suspected a variant of PlugX, a well-known and potent backdoor, given the familiar combination of a G DATA-signed binary, an “avk.dll” sideload, and an encrypted data file – all elements that had previously been linked to PlugX in a February 2026 report by Lab52. However, the discovery of the distinct “Beagle” payload led them to conclude that the threat actors might be either repurposing an established infection chain or mimicking the tactics of another, well-known cybercrime group. This suggests a level of sophistication where attackers are either adapting or borrowing successful attack methods from others.

So, what exactly can “Beagle” do once it’s on your computer? This backdoor, while not the most complex, is certainly effective enough to cause significant damage. It supports eight core commands, giving the attackers a degree of control over the compromised system. These commands include the ability to execute arbitrary shell commands, meaning they can run almost any command-line instruction on your computer. They can also transfer files, allowing them to steal your sensitive data or upload additional malware. Directory listing capabilities let them snoop around your file system, identifying valuable targets. And, chillingly, “Beagle” also includes a self-removal command, enabling the attackers to erase their tracks once they’ve achieved their objectives, making attribution and recovery even harder. To communicate with their masters, “Beagle” connects to a command-and-control (C2) server located at license[.]claude-pro[.]com, using either TCP port 443 or UDP port 8080, encrypting all its traffic with a hardcoded AES key to avoid detection. This encrypted communication channel further complicates efforts to monitor or block the backdoor’s activities.

The Sophos team’s investigation didn’t stop there. They scoured VirusTotal, a platform for analyzing suspicious files, and found more samples that shared the same unique XOR key used by “Beagle,” dating back to February 2026. This indicates that this specific group or method has been active for some time. Interestingly, a variant in March showed a shift in tactics, swapping out the “Beagle” backdoor for shellcode linked to AdaptixC2. AdaptixC2 is an open-source red-teaming framework that Sophos has previously observed being leveraged in ransomware attacks, suggesting a potential escalation in the threat actors’ capabilities or intentions. Furthermore, other related samples were found to use deceptive domains disguised as updates for other popular security software like Trellix, CrowdStrike, and SentinelOne. This tactic of mimicking various trusted entities underscores the attackers’ broad approach to ensnaring victims. The campaign’s operational strategy also caught the researchers’ attention. They observed that the malware was distributed through Cloudflare, a widely used content delivery network that can mask the true origin of threats, while the C2 infrastructure was hosted on Alibaba Cloud. This deliberate separation of distribution and C2 hosting, the researchers noted, isn’t just a random choice. It’s a strategic move to complicate takedown efforts by security researchers and law enforcement. This approach suggests a focus on operational continuity, indicating that this isn’t a fleeting, “one-and-done” campaign, but rather a persistent and evolving threat orchestrated by a resilient and cunning adversary.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
News Room
  • Website

Keep Reading

AI tools to help centre catch fake Ayushman claims | India News

Josh Shapiro sues Character.AI over fake doctors

AI Fakes the Founder and Keeps the Money

Hackers Using Fake Claude AI Installer Pages to Trick Users Into Running Malware on Their Systems

Fake Claude AI website delivers new ‘Beagle’ Windows malware

Italian PM Giorgia Meloni Denounces AI-Generated Deepfakes as a Threat, ETEnterpriseai

Editors Picks

Tracking Adolescents’ Susceptibility to Misinformation in the Digital Age

May 11, 2026

'We've not done well on the propaganda war': PM attributes drop in support from Israel in US to social media disinformation – The Times of Israel

May 11, 2026

Fake News Statistics 2026: Spread, Trust and AI Content Farms • SQ Magazine

May 11, 2026

The Science Misinformation Gap – Quillette

May 11, 2026

‘AI is not the biggest threat. Getting journalism wrong is’

May 11, 2026

Latest Articles

PKR student wing: ‘No confidence’ claim against Anwar is false, Facebook post unauthorised

May 11, 2026

Seed Oils Misinformation Statement | Heart Foundation

May 11, 2026

Misinformation Thought Leader Speaker: Expert Scott Steinberg

May 10, 2026

Subscribe to News

Get the latest news and updates directly to your inbox.

Facebook X (Twitter) Pinterest TikTok Instagram
Copyright © 2026 Web Stat. All Rights Reserved.
  • Privacy Policy
  • Terms
  • Contact

Type above and press Enter to search. Press Esc to cancel.