# Threat Actors Deploy Fake Claude Website to Distribute PlugX RAT Malware
A sophisticated social engineering campaign is leveraging counterfeit Anthropic installation pages to distribute the notorious PlugX remote access trojan (RAT), researchers have discovered. The attack combines credential theft tactics with advanced persistence techniques, highlighting the ongoing risk that legitimate software distribution channels remain prime targets for malware operators.
## The Threat
Security researchers have identified a malicious campaign distributing PlugX RAT through a fraudulent website impersonating Anthropic's official Claude AI installation portal. The attack leverages visual mimicry of legitimate software distribution practices combined with DLL sideloading—a technique that exploits how Windows loads dynamic libraries—to execute malicious code while evading detection.
What makes this campaign particularly concerning is its sophistication:
The campaign demonstrates how threat actors continue to exploit trust in legitimate software distribution to compromise high-value targets.
## Background and Context
### About PlugX RAT
PlugX is a notorious remote access trojan with a decades-long history of use by Chinese state-sponsored APT groups, including APT1 (Comment Crew) and Mustang Panda. The malware has been documented in attacks dating back to at least 2012 and remains one of the most persistent threats in the cyber espionage landscape.
Key characteristics of PlugX:
### DLL Sideloading as Persistence
DLL sideloading is a legitimate-process-abuse technique that exploits Windows' library loading mechanism. When a trusted application (like a legitimate software installer) loads a dynamic library, Windows searches specific directories for the required DLL. Attackers place a malicious DLL in those paths, causing the legitimate application to execute attacker code without triggering security warnings.
This technique is particularly effective because:
## Technical Details
### Attack Chain
The campaign employs a multi-stage infection process:
| Stage | Action | Purpose |
|-------|--------|---------|
| 1 | User visits fake Claude website | Social engineering |
| 2 | Downloads "installer" package | Contains legitimate signed binary + malicious DLL |
| 3 | Legitimate installer executes | Windows loads malicious DLL via sideloading |
| 4 | PlugX RAT instantiates | Reverse shell connects to attacker C2 |
| 5 | Cleanup routines execute | Removes installer artifacts and logs |
### Website Spoofing
The threat actors invested substantial effort in mimicking Anthropic's official installation experience. The fake website reportedly:
### DLL Sideloading Implementation
The specific DLL sideloading technique leverages a legitimate Windows binary bundled with Claude. When the installation routine executes this binary, it searches for required libraries. Attackers place a malicious DLL in the installation directory, achieving code execution before security software can intervene.
The cleanup functionality—actively removing installation artifacts, temporary files, and potentially forensic evidence—suggests sophisticated development and familiarity with endpoint detection and response (EDR) evasion.
## Implications for Organizations
### Risk to Users
Direct users: Anyone downloading software from the fake website receives the PlugX payload. Victims experience:
### Broader Security Ecosystem Impact
This campaign illustrates several concerning trends:
1. Software distribution supply chain risk: Legitimate software remains a high-value attack surface
2. Credential theft sophistication: Users cannot visually distinguish authentic sites from forgeries
3. APT capability advancement: Nation-state groups continue evolving social engineering and evasion techniques
4. Detection evasion: Anti-forensics functionality suggests attackers operate with confidence in evading traditional analysis
### Targeted Organizations
PlugX's historical targeting patterns suggest this campaign likely aims at:
## Recommendations
### For Individual Users
Immediate actions:
Ongoing practices:
### For Organizations
Detection and response:
Prevention strategies:
Incident response:
## Conclusion
The PlugX RAT campaign distributing through a fake Claude website represents a sophisticated threat that combines social engineering credibility with advanced technical evasion. As software distribution channels remain a reliable attack vector, organizations and users must maintain heightened scrutiny around download sources, implement robust detection controls, and assume that sophisticated threat actors continue evolving their tactics against trusted installation processes.
Security awareness, digital signature verification, and proactive threat hunting remain essential defenses against these campaigns.