Sophos — Fake Claude AI Website Delivers Beagle Windows Backdoor
AI relevance: Attackers are impersonating Claude — one of the most widely used AI coding assistants — to deliver a new Windows backdoor, exploiting the trust developers place in popular AI tool brands.
What happened
- A fake Claude AI website at
claude-pro[.]comoffers a "Claude-Pro Relay" download marketed as a high-performance relay for Claude Code developers, reported by Sophos and Malwarebytes on May 7, 2026. - The site mimics Claude's visual design but all secondary links redirect to the front page — only the download button is functional, serving a 505 MB archive named
Claude-Pro-windows-x64.zip. - The ZIP contains an MSI installer that deploys a working (trojanized) Claude copy alongside three startup files:
NOVupdate.exe,NOVupdate.exe.dat, andavk.dll. NOVupdate.exeis a legitimately signed G Data antivirus updater abused for DLL sideloading — a technique catalogued by MITRE as T1574.002. The maliciousavk.dlldecrypts and executes the payload fromNOVupdate.exe.datin memory.- Sophos identified the first-stage loader as DonutLoader, an open-source in-memory injector, which deploys a previously undocumented Windows backdoor the researchers call Beagle (distinct from the 2004 Beagle/Bagle worm).
- The Beagle backdoor supports a limited command set: cmd execution, file upload/download, mkdir, rename, ls, rm, and uninstall — communicating with C2 at
license[.]claude-pro[.]comover TCP/443 or UDP/8080 with a hardcoded AES key. - The C2 server resolves to IP
8.217.190[.]58, within an Alibaba Cloud address range. - Sophos found additional Beagle samples submitted to VirusTotal between February and April 2026 using the same XOR decryption key, delivered via different attack chains including Microsoft Defender binaries, AdaptixC2 shellcode, a decoy PDF, and impersonated update sites for CrowdStrike, SentinelOne, and Trellix.
- The same DLL-sideloading triad (signed binary + malicious DLL + encrypted data file) has been linked to PlugX activity targeting government organizations in Southeast Asia.
- The fake domain's MX records rotated between two bulk-email platforms (Kingmailer and CampaignLark), indicating active campaign maintenance.
- Malwarebytes initially flagged the campaign noting the trojanized installer deploys a PlugX malware chain in the background while the legitimate Claude app runs in the foreground.
Why it matters
Claude receives nearly 290 million web visits per month, making it a high-value impersonation target. This campaign demonstrates that attackers are actively exploiting the growing developer reliance on AI coding tools — users searching for Claude-related downloads are at risk of installing malware that grants persistent remote access. The Beagle backdoor, while limited in command set, establishes a foothold that could be upgraded to more capable payloads, as Sophos linked the same operators to the long-running PlugX espionage toolkit.
What to do
- Download Claude only from the official Anthropic portal (
claude.ai); avoid sponsored search results. - Check systems for
NOVupdate.exe,avk.dll, orNOVupdate.exe.datin the Windows Startup folder — their presence is a strong indicator of compromise. - If infected, run a full system scan with updated security software and review network connections to
8.217.190[.]58orlicense[.]claude-pro[.]com. - Organizations should warn developers about AI tool impersonation and consider DNS-level blocking of the malicious domain and C2 IP.