Hackers Are Now Using Leaked AI Code In Dangerous New Cyberattacks
By 813 Staff

The latest development in AI and tech shows Hackers Are Now Using Leaked AI Code In Dangerous New Cyberattacks, according to The Hacker News (@TheHackersNews) (in the last 24 hours).
Source: https://x.com/TheHackersNews/status/2039988280402612550
The immediate consequence is a surge in sophisticated phishing campaigns targeting software developers, with attackers now wielding the authentic, leaked source code for Anthropic's Claude AI coding assistant as the ultimate lure. According to a warning from The Hacker News (@TheHackersNews), threat actors are actively weaponizing the recent Claude Code leak, creating fraudulent GitHub repositories and developer tools seeded with malicious payloads. These aren't crude imitations; internal documents and proprietary code snippets from the actual leak are being repackaged to appear legitimate, making them exceptionally difficult for even experienced engineers to spot. The rollout of these weaponized repos has been anything but smooth for the security teams now scrambling to contain them.
The attack vector is precise. Developers searching for Claude-related tools, libraries, or even analysis of the leak itself are being directed to these counterfeit repositories. Once a developer clones the repo or downloads a tainted "tool," malware is deployed, often designed to steal credentials, access tokens, and proprietary source code from the victim's own systems. Engineers close to the project say the leak provided attackers with a deep understanding of Claude's architecture, allowing them to craft convincingly detailed documentation and file structures that bypass initial scrutiny. This isn't a spray-and-pray operation; it's a targeted spear-phishing campaign leveraging a high-value, topical event within the tech community.
This matters because it fundamentally shifts the threat model for a critical workforce. Developers, who hold the keys to their company's core intellectual property and infrastructure, are now the primary target. The use of genuine leaked code erodes the standard defense of "check for authenticity," as the repositories themselves contain real, functioning code from the leak alongside the malicious components. The barrier for a successful attack is lowered, increasing the risk of supply chain compromises and significant data breaches originating from within engineering departments.
What happens next is a messy cleanup. GitHub's security team is undoubtedly engaged in a takedown effort, but new repos can be spawned faster than they can be removed. The onus now falls on enterprise security leaders to issue immediate, specific guidance to their development teams, warning against downloading any Claude-related code from unverified sources. Over the next several weeks, we can expect to see incident reports from companies who fell victim, detailing the extent of the damage. What remains uncertain is whether any of the malicious packages managed to infiltrate official dependency managers or were integrated into any legitimate projects before detection, a scenario that would amplify the fallout considerably.
Source: https://x.com/TheHackersNews/status/2039988280402612550
