Close Menu
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Trending

‘Inside the Rage Machine’ exposes social media’s dangerous grip on democracy

May 8, 2026

Addressing Misinformation Regarding Data Center Resource Usage – Yahoo Finance

May 8, 2026

Disinformation in the City

May 8, 2026
Facebook X (Twitter) Instagram
Web StatWeb Stat
  • Home
  • News
  • United Kingdom
  • Misinformation
  • Disinformation
  • AI Fake News
  • False News
  • Guides
Subscribe
Web StatWeb Stat
Home»AI Fake News
AI Fake News

Fake Claude AI website delivers new ‘Beagle’ Windows malware

News RoomBy News RoomMay 7, 2026Updated:May 8, 20267 Mins Read
Facebook Twitter Pinterest WhatsApp Telegram Email LinkedIn Tumblr

In a chilling tale of digital deception, a cunning threat actor has unleashed a sophisticated attack, leveraging the burgeoning popularity of AI models to ensnare unsuspecting users. This elaborate scheme, centered around a counterfeit version of the Claude AI website, serves as a stark reminder of the ever-evolving tactics employed by cybercriminals to breach our digital defenses. It’s a story of a seemingly innocent download button, leading down a rabbit hole of malicious code and a newly discovered backdoor named Beagle, poised to compromise systems and steal valuable information. This narrative, while rooted in the technical intricacies of cybersecurity, touches upon universal themes of trust, vigilance, and the constant battle between innovation and exploitation.

The deception begins with a meticulously crafted fake website, “claude-pro[.]com,” designed to mimic the legitimate Claude AI portal. At first glance, the site appears almost convincing, adopting the familiar color palette and fonts of the genuine article. However, a closer inspection reveals its superficiality; the links, rather than navigating to different sections, merely redirect back to the home page, betraying the site’s true nature. This deliberate simplicity, ironically, is part of its insidious charm. Users, eager to download the “high-performance relay service” advertised as “Claude-Pro” for developers, are drawn to the prominent download button, overlooking the subtle cues that scream “fake.” This highlights a fundamental human vulnerability: our tendency to trust what appears familiar, especially when driven by a desire for convenience or advancement. The promise of an enhanced Claude AI experience, particularly for developers, acts as a powerful lure, overshadowing the red flags that careful observation might reveal. It’s a classic phishing tactic, but with a modern AI twist, playing on the excitement and eagerness surrounding cutting-edge technology. The sheer size of the download – a 505MB archive named ‘Claude-Pro-windows-x64.zip’ – further reinforces the illusion of a legitimate, substantial software package, drawing users deeper into the trap.

Once downloaded and executed, the seemingly innocuous ‘Claude-Pro-windows-x64.zip’ file unravels into a complex web of malicious activities. Inside the archive lies an MSI installer, which, upon execution, initiates a covert installation process. This process isn’t just about installing the advertised software; it’s a Trojan horse, setting the stage for a deeper compromise. The installation quietly introduces three critical files into the user’s Startup folder: ‘NOVupdate.exe’, ‘NOVupdate.exe.dat’, and ‘avk.dll’. These files are not isolated components but rather cogs in a sophisticated machine designed for persistent access and control. ‘NOVupdate.exe’, a signed updater for G Data security solutions, is particularly cunning. Its legitimate digital signature lends an air of authenticity, allowing it to bypass some initial security checks. However, this legitimate executable is being abused, or “sideloaded,” to execute the malicious ‘avk.dll’ and ‘NOVupdate.exe.dat’ files. This technique, known as DLL sideloading, is a common evasion strategy, leveraging trusted processes to introduce hostile code. The ultimate goal here is to establish a foothold on the system, a crucial first step for any attacker aiming for long-term compromise. The deceptive nature of these files, masquerading as legitimate updates, emphasizes the attacker’s sophisticated understanding of system processes and security mechanisms.

The core of this attack vector lies in a previously undocumented backdoor known as Beagle. Discovered by Sophos researchers, Beagle is described as a “relatively simple backdoor” yet remarkably effective. Its limited set of commands – uninstall, cmd, upload, download, mkdir, rename, ls, and rm – belies its potential for damage. These commands, though basic, grant the attacker significant control over the compromised system. They can execute arbitrary commands, exfiltrate sensitive files, inject new malicious payloads, or even wipe data. It’s important to clarify that this Beagle is distinct from the notorious Delphi-based Beagle/Bagle worm of 2004, underscoring the constant evolution of malware names and functionalities. The initial stage of this attack involves DonutLoader, an open-source in-memory injector. DonutLoader’s role is to decrypt and execute the payload hidden within ‘NOVupdate.exe.dat’ directly into memory. This in-memory execution is a critical technique for evading detection, as it leaves minimal traces on the disk. Sophos had previously encountered DonutLoader in attacks targeting government organizations in Southeast Asia, highlighting its effectiveness and the potential for a broader campaign. The final payload, the Beagle backdoor, is then deployed into system memory, ready to communicate with its command-and-control (C2) server. This layered approach, from the initial deceptive download to the final in-memory execution of Beagle, showcases a carefully orchestrated attack chain designed for stealth and persistence.

The communication backbone for the Beagle backdoor is its command-and-control (C2) server, located at ‘license[.]claude-pro[.]com’, hosted on an Alibaba-Cloud IP address (8.217.190[.]58). This C2 server acts as the central hub for the attackers, allowing them to send commands to compromised systems and receive exfiltrated data. The communication itself is secured using a hardcoded AES key, traversing through TCP over port 443 and/or UDP over port 8080. This encrypted communication channel further complicates detection and analysis, making it harder for security researchers to understand the full scope of the attacker’s activities. What’s particularly concerning is the discovery of additional Beagle samples on VirusTotal, submitted between February and April of the current year. These samples, while using the same XOR decryption key as the current campaign, indicate a broader pattern of Beagle deployment through various attack chains. This broader evidence suggests a well-established and active threat actor, constantly refining their tactics. These alternative attack vectors included exploiting Microsoft Defender binaries, deploying AdaptixC2 shellcode with decoy PDFs, and impersonating update sites from major security vendors like CrowdStrike, SentinelOne, and Trellix. This diversification of attack methods demonstrates the actor’s adaptability and determination to reach a wide range of targets, exploiting different vulnerabilities and trust relationships. The association with previously observed PlugX activity, a notorious modular remote access Trojan, further strengthens the hypothesis that a sophisticated and persistent threat group is behind these attacks, potentially experimenting with Beagle as a new payload within their extensive arsenal.

Understanding the complexity of this attack underscores the critical need for vigilance and proactive security measures. For an individual user, the primary defense lies in exercising extreme caution when downloading software, especially from unfamiliar sources. Always prioritize official websites and channels for software downloads, and be wary of sponsored search results that might lead to malicious domains. These sponsored links, often appearing at the top of search engine results, can be cleverly disguised to look legitimate while directing users to compromised sites. Furthermore, it’s crucial to be aware of the telltale signs of compromise. The presence of ‘NOVupdate’ files on a system should immediately trigger an alert, indicating that potential malicious activity is underway. For organizations, the implications are even more severe. The sophisticated nature of this attack, including DLL sideloading, in-memory execution, and the use of legitimate executables, demands advanced endpoint detection and response (EDR) solutions. These tools can monitor for anomalous behavior, detect stealthy malware like Beagle, and prevent its communication with C2 servers. Regular security awareness training for employees is also paramount, educating them about phishing attempts, social engineering tactics, and the importance of verifying download sources. While attributing the campaign to a specific threat actor remains challenging, the sophisticated techniques and the use of a new backdoor like Beagle suggest the involvement of a well-resourced and persistent group. This ongoing threat highlights the continuous cat-and-mouse game between cyber defenders and attackers, where innovation and adaptation are key to staying ahead. By understanding the techniques employed in this Claude AI deception, individuals and organizations can fortify their defenses, protect their digital assets, and navigate the increasingly complex landscape of cybersecurity with greater confidence.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
News Room
  • Website

Keep Reading

Italian PM Giorgia Meloni Denounces AI-Generated Deepfakes as a Threat, ETEnterpriseai

The AI fitness instructors selling unreal gains

AI video supporting Spencer Pratt’s L.A. mayoral campaign goes viral

Reform candidate ‘accidentally’ shares fake AI video of a Muslim man

How to survive the information crisis: ‘We once talked about fake news – now reality itself feels fake’ | Media

Report reveals: Fake AI ‘rabbis’ spread antisemitism on TikTok

Editors Picks

Addressing Misinformation Regarding Data Center Resource Usage – Yahoo Finance

May 8, 2026

Disinformation in the City

May 8, 2026

Ministry launches strategy to combat misinformation on labour schemes

May 8, 2026

Authorities detain curator of Russian disinformation network in Argentina

May 8, 2026

Misinformation minefield: How to tell if online medical advice can be trusted

May 7, 2026

Latest Articles

Stakeholders: Disinformation erodes citizens’ confidence in democratic institutions

May 7, 2026

Combating disinformation must not be confused with censorship

May 7, 2026

Reforms should target misinformation that undermines voters’ trust, says elections chief

May 7, 2026

Subscribe to News

Get the latest news and updates directly to your inbox.

Facebook X (Twitter) Pinterest TikTok Instagram
Copyright © 2026 Web Stat. All Rights Reserved.
  • Privacy Policy
  • Terms
  • Contact

Type above and press Enter to search. Press Esc to cancel.