Threat actors have weaponised UK developers' interest in artificial intelligence by distributing credential-stealing malware disguised as the leaked source code for Anthropic's Claude Code development tool. The campaign demonstrates how quickly cybercriminals exploit emerging technology trends to compromise business systems through trusted developer platforms.
Claude Code is Anthropic's integrated development environment that leverages AI to assist with software development tasks. According to reporting from BleepingComputer, cybercriminals are creating fake GitHub repositories claiming to contain the leaked Claude Code source, but instead delivering Vidar information-stealing malware to unsuspecting developers who download these repositories.
Key Facts:
- Fake GitHub repositories claiming to host leaked Claude Code source are distributing Vidar credential-stealing malware
- The campaign specifically targets developers interested in AI development tools
- Vidar malware harvests browser credentials, cryptocurrency wallets, and authentication tokens from infected systems
- Attacks exploit developer trust in GitHub as a legitimate source for software tools
How the Attack Exploits Developer Workflows
The malware campaign leverages fundamental weaknesses in how developers discover and evaluate new tools. When news broke of the alleged Claude Code leak, developers naturally turned to GitHub to locate the source code. Cybercriminals anticipated this behaviour, creating convincing repositories with names and descriptions that would appear in search results.
The NCSC has consistently warned that software supply chain attacks represent one of the most significant threats to UK business infrastructure. These attacks succeed because they exploit the implicit trust developers place in code repositories and the pressure to quickly adopt competitive AI technologies. The Vidar malware deployed in this campaign specifically targets the credentials and tokens that developers use to access business systems, potentially providing attackers with privileged access to entire development environments.
Why This Threatens UK Business Security
Developers who fall victim to these fake repositories inadvertently install malware that harvests browser credentials, authentication tokens, cryptocurrency wallets, and other sensitive data. For UK businesses, this presents a critical risk because developers typically maintain elevated access to business-critical systems, source code repositories, and cloud infrastructure.
The timing of this campaign is particularly concerning as UK businesses accelerate AI adoption following recent government initiatives to promote artificial intelligence competitiveness. The NCSC's Secure-by-Design principles emphasise that organisations must verify the authenticity of software components, yet the speed of AI development often pressures teams to bypass established security verification processes.
This attack pattern mirrors the broader trend of supply chain compromises targeting development environments, where attackers understand that compromising a single developer workstation can provide access to entire business infrastructures.
What Makes GitHub-Based Attacks So Effective?
GitHub's reputation as the primary platform for open-source software creates a false sense of security that cybercriminals readily exploit. Developers routinely download code from GitHub repositories without performing the same security verification they would apply to executable files from unknown sources.
The platform's collaborative nature means that malicious repositories can quickly accumulate stars, forks, and apparent legitimacy through automated or coordinated activity. UK businesses often lack policies governing how developers should verify the authenticity of code repositories, particularly for emerging technologies where official sources may be unclear.
ISO 27001 frameworks require organisations to implement controls for software acquisition and development, yet many UK businesses have not extended these controls to cover ad-hoc developer tool adoption. The speed at which AI tools emerge and evolve makes it difficult for security teams to maintain approved software catalogues that keep pace with developer needs.
Boardroom Questions
How do we verify that developers are only downloading software tools from authenticated sources, and what approval process exists for AI development tools?
What monitoring capabilities do we have to detect when development workstations are compromised by credential-stealing malware?
Have we assessed whether our current software supply chain security policies adequately cover the rapid adoption of AI development tools?
Quick Diagnostic
Do your developers have documented procedures for verifying the authenticity of code repositories before downloading development tools?
Have you implemented endpoint detection capabilities that can identify credential-harvesting malware on developer workstations?
Does your organisation maintain an approved catalogue of AI development tools that developers must use instead of sourcing tools independently?
Related Reading
First Major Victim Emerges From AI Supply Chain Attack That Hit 500,000 Systems — AI hiring startup Mercor becomes first public victim of LiteLLM supply-chain attack affecting 500,000 systems globally.
Axios NPM Package Compromised in Precision Supply Chain Attack — Attackers inject RAT malware into widely-used JavaScript HTTP client library, exposing UK organisations through CI/CD pi
TeamPCP's Audio Steganography Attack Hides Malware Inside 740K-Download Python Package — Supply chain attackers compromised the Telnyx PyPI package, embedding credential stealers inside WAV audio files to evad
Popular Security Scanner Trivy Weaponised Against UK DevSecOps Teams in Supply Chain Attack — Attackers compromised Aqua Security's widely-used Trivy vulnerability scanner on March 19, injecting credential-stealing
GlassWorm Malware Abuses Extension Dependencies to Target UK Developers — GlassWorm supply chain attacks evolve to exploit VS Code extension dependencies, with 72 new malicious extensions target
Strengthen your organisation's security posture

