Hackers Weaponize Claude Code Leak to Spread Vidar and GhostSocks Malware

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

The cybersecurity community is on high alert following a massive source code leak from Anthropic. On March 31, 2026, the company accidentally exposed the complete source code for Claude Code, its flagship terminal-based coding assistant.

The leak occurred due to a packaging error in a public npm package, which inadvertently included a JavaScript source map file containing over half a million lines of unobfuscated TypeScript. While the exposed data did not include model weights or user data, it did reveal highly sensitive internal mechanisms.

Almost immediately after security researcher Chaofan Shou publicly disclosed the incident on social media, the codebase was mirrored across GitHub and forked tens of thousands of times.

Google search results for leaked Claude Code on GitHub returning a malicious repository (Source: Zscaler)

The widespread availability of the proprietary code has created a massive vector for supply chain attacks. Cybercriminals are now actively weaponizing this incident, creating malicious forks designed to compromise developer workstations.

Zscaler ThreatLabz researchers recently discovered a highly deceptive campaign leveraging the leak as a social engineering lure to target developers seeking access to the source code.

Malicious GitHub repository using the leaked Claude Code source as a lure (Source: Zscaler)

Delivering Vidar and GhostSocks Malware

In this newly discovered campaign, attackers have established malicious GitHub repositories that masquerade as the authentic leaked repository.

One prominent page, published by a threat actor named idbzoomh, currently ranks near the top of search engine results for users attempting to find the files.

Malicious GitHub repository using the leaked Claude Code source as a lure (Source: Zscaler)

The repository promises an unlocked version of the enterprise software featuring no usage limits. Instead of legitimate code, the provided zip archive contains a Rust-based dropper executable.

Upon execution, this dropper deploys the Vidar information stealer to siphon sensitive credentials and GhostSocks to proxy network traffic.

This deployment of GhostSocks closely mirrors previously observed campaigns where threat actors utilized fake software installers to distribute network proxies alongside data-stealing malware.

 Additional GitHub repository hosting the same Claude Code leak lure with a “Download ZIP” button. (Source: Zscaler)

The exposure of these internal components presents severe risks that extend far beyond simple social engineering lures. The leaked files reveal complex orchestration details, permission execution layers, persistent memory systems, and dozens of hidden internal feature flags.

Because the original codebase includes advanced capabilities for local shell execution and auto-executing scripts, threat actors possessing the full source can easily craft precise exploits.

Attackers can potentially trigger silent device takeovers or credential theft simply by tricking a developer into cloning an untrusted repository or opening a specially crafted project file.

Mitigation and Defense Strategies

Organizations must implement immediate defensive measures to protect their development environments from these opportunistic attacks.

Security teams should strongly advise all developers against downloading, building, or running any code claiming to be the leaked Anthropic software. Relying strictly on official channels and signed binaries is essential for maintaining integrity.

Furthermore, implementing a Zero Trust architecture and segmenting access to critical applications will help limit the potential blast radius if a developer workstation becomes compromised.

Monitoring for anomalous outbound network connections and scanning local environments for unexpected npm packages are critical steps for identifying early signs of infection.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.