Fake Claude AI Installer Delivers PlugX via DLL Sideloading

Fake Claude AI Installer Delivers PlugX via DLL Sideloading

Cybercriminals are leveraging the buzz around AI chatbots to lure unsuspecting users into malware traps. Security Affairs reports that a fake website, masquerading as Anthropic’s popular Claude AI service, has been caught distributing the notorious PlugX remote access trojan (RAT). The attackers are pushing a ZIP archive, falsely advertised as a “pro version” installer, which silently deploys the PlugX payload.

According to Security Affairs, the malicious site mimics Claude’s official appearance, tricking visitors into downloading what appears to be a legitimate installer. Once executed, the fake Claude application runs as expected, but in the background, it initiates a PlugX infection chain. The initial dropper script drops essential components—NOVUpdate.exe, avk.dll, and an encrypted .dat file—into the Windows Startup folder. The real trick lies in the execution of NOVUpdate.exe, a legitimate, signed updater from G DATA. This trusted executable is manipulated to load a malicious DLL, avk.dll, from the same directory—a classic DLL sideloading technique (MITRE T1574.002). This tactic bypasses security scrutiny by using a seemingly benign, signed parent process.

Once loaded, the malicious avk.dll decrypts and executes the final payload from the .dat file, granting attackers unfettered remote access. This multi-stage approach, featuring a signed executable, a trojanized DLL, and an encrypted payload, is a hallmark of PlugX, a malware family frequently employed in sophisticated cyber-espionage operations. Security Affairs noted that within seconds of execution, the malware establishes communication with a command-and-control server hosted on Alibaba Cloud infrastructure, signaling an immediate compromise and potential data exfiltration.

What This Means For You

  • If your organization uses AI tools or downloads software from unofficial sources, scrutinize all installers. Verify the authenticity of download sites and ensure your endpoint detection and response (EDR) solutions are up-to-date to catch DLL sideloading attempts and known malware families like PlugX.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 5 SIEM formats

2 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1574.002 Persistence

DLL Side-Loading Detection

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

2 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
PlugX-Claude-Fake Malware PlugX RAT deployed via fake Anthropic Claude AI installer
PlugX-Claude-Fake DLL Sideloading NOVUpdate.exe (legitimate G DATA updater) loads malicious avk.dll (T1574.002)
PlugX-Claude-Fake Indicator Dropped files: NOVUpdate.exe, avk.dll, encrypted .dat payload in Windows Startup folder
PlugX-Claude-Fake C2 Infrastructure Command-and-control server hosted on Alibaba Cloud

Related Posts

JanaWare Ransomware: Turkish Citizens in the Crosshairs

The cybercriminal landscape is a constantly shifting beast, and new ransomware strains are always emerging. According to The Record by Recorded Future, a new player...

threat-inteldata-breachgovernmentmalwareransomwareidentity
/MEDIUM

Microsoft Drops Windows 10 Extended Security Update

Microsoft has rolled out the Windows 10 KB5082200 extended security update, a critical patch addressing vulnerabilities initially slated for the April 2026 Patch Tuesday. According...

threat-inteldata-breachmalwarevulnerabilitymicrosofttools
/HIGH

McGraw-Hill Confirms Breach via Salesforce Misconfig

Education giant McGraw-Hill has confirmed a data breach following an extortion attempt, as reported by BleepingComputer. The incident, which saw hackers gain access to internal...

threat-inteldata-breachmalwarevulnerability
/HIGH