Obfuscated PowerShell infostealer deployed via fake Claude Code pages to harvest browser data from developer workstations
Summary
Hide ▲
Show ▼
A previously undocumented PowerShell-based information stealer was distributed through fraudulent Claude Code installation pages, targeting developer workstations to harvest cookies, passwords, and payment data from Chromium-family browsers. Victims were redirected via sponsored search results for "install claude code" to spoofed pages that delivered an obfuscated PowerShell loader. The loader reflectively injected a native helper into live browser processes to extract App-Bound Encryption keys via the IElevator2 COM interface. The campaign operated from operator-controlled domains registered in April 2026, with payloads designed to evade behavioral detection by splitting malicious functionality between PowerShell and native code. Persistence was established via scheduled tasks polling a C2 endpoint with regional exclusions.
Timeline
-
11.05.2026 17:00 1 articles · 2h ago
Undocumented PowerShell infostealer delivered via fake Claude Code installers to harvest browser data
Between late April and early May 2026, a previously undocumented PowerShell-based information stealer was distributed via fake Claude Code installation pages. The campaign redirected victims from sponsored search results to spoofed pages delivering an obfuscated PowerShell loader designed to harvest cookies, passwords, and payment data from Chromium-family browsers. The loader reflectively injected a native helper into live browser processes to extract App-Bound Encryption keys via the IElevator2 COM interface, a technique resembling Glove Stealer (2024). Persistence was established via scheduled tasks polling a C2 endpoint with regional exclusions, and the malware’s split architecture was engineered to evade behavioral detection by confining visible activity to the PowerShell layer.
Show sources
- Fake Claude Code Page Pushes PowerShell Stealer at Devs — www.infosecurity-magazine.com — 11.05.2026 17:00
Information Snippets
-
The campaign distributed a previously undocumented information stealer through fake Claude Code installation pages, hijacking Chromium browsers to bypass App-Bound Encryption and exfiltrate cookies, passwords, and payment data from developer workstations.
First reported: 11.05.2026 17:001 source, 1 articleShow sources
- Fake Claude Code Page Pushes PowerShell Stealer at Devs — www.infosecurity-magazine.com — 11.05.2026 17:00
-
Victims were redirected from sponsored search results for "install claude code" to spoofed pages that delivered an obfuscated PowerShell loader via a maliciously altered one-line installation command.
First reported: 11.05.2026 17:001 source, 1 articleShow sources
- Fake Claude Code Page Pushes PowerShell Stealer at Devs — www.infosecurity-magazine.com — 11.05.2026 17:00
-
The PowerShell loader is approximately 600 KB in size and was compiled within 60 days of Chrome 144’s January 2026 release, indicating active tracking of upstream Chromium changes.
First reported: 11.05.2026 17:001 source, 1 articleShow sources
- Fake Claude Code Page Pushes PowerShell Stealer at Devs — www.infosecurity-magazine.com — 11.05.2026 17:00
-
The loader reflectively injects a 4608-byte native helper into live browser processes to invoke the IElevator2 COM interface and recover App-Bound Encryption keys, a technique previously observed in Glove Stealer (2024).
First reported: 11.05.2026 17:001 source, 1 articleShow sources
- Fake Claude Code Page Pushes PowerShell Stealer at Devs — www.infosecurity-magazine.com — 11.05.2026 17:00
-
The native helper exposes no network, file, or cryptographic imports, confining detection-visible activity to the PowerShell layer to evade behavioral rule sets inspecting native binaries in isolation.
First reported: 11.05.2026 17:001 source, 1 articleShow sources
- Fake Claude Code Page Pushes PowerShell Stealer at Devs — www.infosecurity-magazine.com — 11.05.2026 17:00
-
The loader establishes persistence via a Windows scheduled task polling a C2 endpoint every minute, with early exit if the host’s region matches an exclusion list including Iran, Russia, and CIS members.
First reported: 11.05.2026 17:001 source, 1 articleShow sources
- Fake Claude Code Page Pushes PowerShell Stealer at Devs — www.infosecurity-magazine.com — 11.05.2026 17:00
-
The loader contains a transcribed error in the Edge IElevator2 IID (Data3 field) that causes the initial call to fail silently, triggering a fallback to the legacy IElevator interface, which doubles as a high-confidence detection signature.
First reported: 11.05.2026 17:001 source, 1 articleShow sources
- Fake Claude Code Page Pushes PowerShell Stealer at Devs — www.infosecurity-magazine.com — 11.05.2026 17:00
-
The campaign’s operator-controlled domains were registered within a six-day window in April 2026.
First reported: 11.05.2026 17:001 source, 1 articleShow sources
- Fake Claude Code Page Pushes PowerShell Stealer at Devs — www.infosecurity-magazine.com — 11.05.2026 17:00