Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
93%
"scheme. first, the data is xor - encoded with key 44. the result is then base64 - encoded for storage. at runtime, the malware reverses this process : # embedded xor - encoded powershell payload $ uowuunxt = ' cfwddbemc28wchlfsv5fcyyixb4meqwocelcwhz4awf8... ' $ umordtbr = [ syste…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
88%
"##kmnvk ) ) after xor decryption with key 44 ( 0x2c ), the payload reveals significant windows defender evasion and firewall manipulation capabilities. the decrypted script systematically disables security controls to enable follow - on payloads to execute without interference. t…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
76%
"from this campaign by tightening controls around tool installation, validating software sources, and actively monitoring for malicious activity using the following measures. - instruct developers to use verified sources only. legitimate claude code is available only through offic…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
66%
"threat actor accounts include idbzoomh ( taken down by github ), idbzoomh1, and my3jie. the accounts are disposable, as operators demonstrate no attachment to any single identity or lure theme. infection chain the infection chain is consistent across all lure variants : - discove…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
51%
"weaponizing trust signals : claude code lures and github release payloads artificial intelligence ( ai ) weaponizing trust signals : claude code lures and github release payloads a packaging error in anthropic ’ s claude code npm release briefly exposed internal source code. this…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
47%
"oat ) to hunt for suspicious activity associated with this threat, and are protected by advanced pattern, behavior - monitoring, and signature - based detections. in late march 2026, anthropic inadvertently released the internal claude code source material as part of an npm packa…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1587Develop Capabilities
45%
"from this campaign by tightening controls around tool installation, validating software sources, and actively monitoring for malicious activity using the following measures. - instruct developers to use verified sources only. legitimate claude code is available only through offic…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.002Tool
33%
"from this campaign by tightening controls around tool installation, validating software sources, and actively monitoring for malicious activity using the following measures. - instruct developers to use verified sources only. legitimate claude code is available only through offic…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1497.001System Checks
33%
"of api calls : getconsolewindow ( ), showwindow ( sw _ hide ), and freeconsole ( ). this prevents users from noticing the command window that would otherwise appear during execution. following initialization, command - line arguments are parsed to determine the execution path. th…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
A packaging error in Anthropic’s Claude Code npm release briefly exposed internal source code. This entry examines how threat actors rapidly weaponized the resulting attention, pivoting an existing AI-themed campaign to spread Vidar and GhostSocks.