
Attackers use fake installers to steal private keys and browser cookies. Developers should audit system permissions before the next security update cycle.
Alpha Score of 46 reflects weak overall profile with strong momentum, poor value, poor quality, moderate sentiment.
Bybit’s Security Operations Center has identified a sophisticated multi-stage malware campaign specifically targeting macOS users who are searching for Claude Code, the AI-powered development tool released by Anthropic. The campaign leverages search engine optimization tactics to direct users toward malicious sites that masquerade as legitimate download portals for the development software. Once a user initiates a download from these compromised sources, the malware executes a series of scripts designed to bypass macOS security protocols and establish persistence on the host machine.
The attack sequence relies on a decoy installer that mimics the official Claude Code distribution package. Upon execution, the malware deploys a secondary payload that scans the local environment for sensitive data, including browser cookies, saved credentials, and private keys associated with digital asset wallets. Bybit’s analysis indicates that the threat actors are specifically looking for high-value targets, such as developers and individuals managing significant crypto holdings, who are likely to be early adopters of new AI coding assistants.
This campaign highlights the increasing risk profile for users interacting with emerging AI tools. Because these tools often require elevated system permissions to function within a local development environment, users are frequently conditioned to bypass standard security warnings. The malware exploits this behavioral pattern to gain unauthorized access to the system without triggering immediate alerts from common endpoint protection software.
The primary objective of this campaign appears to be the exfiltration of private keys and session tokens. For users who manage crypto assets directly on their machines, the compromise of a local development environment can lead to the immediate drainage of wallets. The threat is particularly acute for those who integrate their development workflows with crypto market analysis tools or manage collateral through platforms like BitMEX Integrates Zodia Custody for Off-Exchange Collateral Settlement.
Security teams are advising users to verify the source of all development tools against official documentation provided by Anthropic. Users should also audit their macOS permission settings to ensure that no unauthorized applications have been granted accessibility or disk access rights. The following indicators are common across the identified malicious packages:
AlphaScala currently tracks various technology and healthcare equities that may be impacted by broader cybersecurity trends. For instance, ON Semiconductor Corporation holds an Alpha Score of 45/100, labeled as Mixed, while Agilent Technologies, Inc. holds an Alpha Score of 55/100, labeled as Moderate. You can find more information on ON stock page and the A stock page.
The next concrete marker for this threat will be the release of updated security signatures by major antivirus vendors and the potential identification of the command-and-control infrastructure used by the attackers. Users should monitor official Anthropic channels for any further guidance regarding the secure distribution of their software tools.
Prepared with AlphaScala research tooling and grounded in primary market data: live prices, fundamentals, SEC filings, hedge-fund holdings, and insider activity. Each story is checked against AlphaScala publishing rules before release. Educational coverage, not personalized advice.