The Claude Code leak malware campaigns are now live. On March 31, 2026, Anthropic’s Claude Code source code leaked publicly, and within days, threat actors weaponized it. Hackers are distributing infostealers through fraudulent installation pages and fake repositories, targeting developers on Windows and Mac systems.
Key Takeaways
- Claude Code source leaked March 31, 2026; malware campaigns began immediately after
- Fake installation pages and repositories distribute Vidar and Amatera infostealers to developers
- GhostSocks proxy malware enables network proxying for infected machines
- Both Windows and Mac users are targeted by the same campaigns
- Developers should verify repository authenticity and avoid unofficial installation sources
How Hackers Are Exploiting the Claude Code Leak
The Claude Code leak malware campaigns rely on a simple but effective social engineering attack. Threat actors create fake GitHub repositories and installation pages that mimic legitimate Claude Code distributions. Developers searching for Claude Code tools or trying to install them from unofficial sources encounter these traps. Once clicked or executed, the malware infects the system.
The campaigns distribute multiple malware families. Vidar and Amatera are infostealers—malware designed to harvest credentials, browser data, and sensitive files from infected machines. These tools are particularly dangerous for developers because their systems often contain API keys, authentication tokens, and access credentials for production environments. A compromised developer machine becomes a beachhead for attacking the companies and services they work on.
GhostSocks represents a second layer of the threat. This proxy malware allows attackers to route network traffic through infected machines, converting compromised computers into proxies for further attacks. A developer’s machine becomes an unwitting relay for criminal activity, potentially implicating the developer’s company in data theft or other attacks.
Why the Claude Code Leak Matters Right Now
The Claude Code leak malware campaigns are urgent because they target a specific, high-value audience: developers. Unlike consumer malware, which harvests passwords and payment information, developer-focused malware aims for infrastructure access. Stolen API keys and authentication tokens can grant attackers direct access to cloud environments, databases, and production systems.
The timing amplifies the risk. The leak occurred on March 31, 2026, and malware campaigns began immediately. Developers may not yet be aware that the source code is compromised, making them more likely to download what they believe is legitimate software. Security teams at most organizations have not yet issued warnings about the specific malware families involved, leaving developers vulnerable during the initial window of exploitation.
The campaigns also target both Windows and Mac users, indicating broad distribution and technical sophistication. Attackers are not limiting themselves to a single operating system or developer demographic—they are casting a wide net to maximize infections.
Protecting Yourself From Claude Code Leak Malware
First, verify the source. Only download Claude Code from official Anthropic channels. Check the domain carefully—attackers often use URLs that closely resemble legitimate ones, with subtle misspellings or slightly different TLDs. If you are installing via a package manager or repository, confirm the repository URL matches Anthropic’s official documentation.
Second, be skeptical of unsolicited installation prompts. If you did not explicitly search for Claude Code or initiate a download, do not click links claiming to install it. Threat actors use social engineering—fake forum posts, GitHub issues, and Stack Overflow answers—to distribute malware.
Third, monitor your system for suspicious activity. If you have already installed Claude Code from an unofficial source, run a full antivirus scan immediately. Check your browser history and installed programs for unfamiliar software. Review your API keys and authentication tokens—if you suspect compromise, rotate them immediately.
Finally, use a password manager and multi-factor authentication (MFA) on all accounts that control infrastructure. Even if an infostealer harvests your credentials, MFA prevents immediate account takeover.
What Security Teams Should Do
Organizations should issue an immediate alert to developers about the Claude Code leak malware campaigns. Include specific guidance: do not download Claude Code from unofficial sources, verify all installation sources, and report any suspicious activity. Security teams should scan developer machines for Vidar, Amatera, and GhostSocks signatures using updated antivirus definitions.
Consider blocking access to known malicious repositories at the network level. If your organization uses code scanning tools, configure them to flag any dependencies or tools sourced from untrusted repositories.
Is the Claude Code leak malware a widespread threat?
Yes. The campaigns target developers globally across Windows and Mac systems, and they began immediately after the March 31, 2026 leak. Any developer who has downloaded Claude Code from unofficial sources in the past week is at risk.
Can the Claude Code leak malware steal my API keys?
Yes. Vidar and Amatera are infostealers designed to harvest credentials and sensitive files, including API keys stored in browser caches, configuration files, and environment variables. Compromised API keys grant attackers access to cloud environments and production systems.
How do I know if my machine is infected with Claude Code leak malware?
Run a full system scan with updated antivirus software, checking specifically for Vidar, Amatera, and GhostSocks. Monitor network traffic for unusual outbound connections. Check your installed programs for unfamiliar software. If you downloaded Claude Code from an unofficial source, assume compromise and rotate all credentials immediately.
The Claude Code leak malware campaigns demonstrate how quickly security vulnerabilities become attack vectors. Developers are high-value targets because they control infrastructure. Do not assume an unofficial installation page is safe because it looks legitimate—verify every source, and when in doubt, contact your security team. The few seconds spent confirming authenticity can prevent weeks of incident response and credential rotation.
This article was written with AI assistance and editorially reviewed.
Source: TechRadar


