Fake Claude AI Site Spreads Beagle Backdoor via DLL Sideloading
A malicious website impersonating Anthropic's Claude AI platform delivers the Beagle backdoor through a DLL sideloading attack, leveraging a compromised G DATA antivirus updater to execute malicious code.
A fake website mimicking Anthropic’s Claude AI platform (claude-pro[.]com) is distributing malware via malvertising. The site offers a “Claude-Pro Relay” download, which is a large ZIP archive containing a malicious MSI installer. The installer drops a trojanized version of the G DATA antivirus updater (NOVupdate.exe), a malicious DLL (avk.dll), and an encrypted data file into the user’s startup folder. This leverages DLL sideloading to execute a previously undocumented backdoor, dubbed “Beagle.” The attack shares characteristics with PlugX campaigns but utilizes distinct malware components. The threat actor may have inadvertently disclosed their CloudFlare origin certificate, indicating a possible hosting server (209[.]189[.]190[.]206), and are also linked to the domain vertextrust-advisors[.]com (178[.]128[.]108[.]89), registered in mid-April 2026, posing as a legal advisory service.
Attack Chain
- The user clicks on a malvertisement, leading them to the malicious claude-pro[.]com website.
- The user downloads the “Claude-Pro Relay” software, a ZIP archive named Claude-Pro-windows-x64.zip.
- The user extracts and executes the Claude.msi installer.
- The installer drops NOVupdate.exe (a legitimate, signed G DATA updater), avk.dll (a malicious DLL), and NOVupdate.exe.dat (an encrypted data file) into the user’s startup folder.
- Upon system startup, NOVupdate.exe executes and attempts to load avk.dll from the same directory, sideloading the malicious DLL instead of the legitimate one.
- The malicious avk.dll decrypts and executes DonutLoader shellcode from NOVupdate.exe.dat.
- DonutLoader loads the Beagle backdoor into memory.
- Beagle establishes a connection with its command-and-control server (license[.]claude-pro[.]com) over TCP (443) and/or UDP (8080), awaiting further instructions.
Impact
Successful execution of this attack leads to the installation of the Beagle backdoor on the victim’s system, allowing the attacker to perform various malicious activities, including data theft, remote control, and further malware deployment. The use of a signed G DATA executable for DLL sideloading allows the attackers to bypass some security measures, potentially impacting systems even with antivirus solutions installed. While the exact number of victims is unknown, this campaign leverages widespread malvertising, suggesting a broad potential impact.
Recommendation
- Block the malicious domains and IPs associated with this campaign (claude-pro[.]com, vertextrust-advisors[.]com, license[.]claude-pro[.]com, 209[.]189[.]190[.]206, 178[.]128[.]108[.]89, 8[.]217[.]190[.]58) at the DNS resolver and firewall.
- Deploy the Sigma rule “Detect Suspicious DLL Sideloading with G DATA Updater” to detect the execution of the malicious avk.dll.
- Monitor process creation events for NOVupdate.exe loading unexpected DLLs using process_creation logs.
- Investigate systems where files named avk.dll, NOVupdate.exe, and NOVupdate.exe.dat are found together in the same directory, especially within startup folders.
Detection coverage 2
Detect Suspicious DLL Sideloading with G DATA Updater
highDetects DLL sideloading attempts by the G DATA updater (NOVupdate.exe) by monitoring for the loading of avk.dll from the same directory.
Detect Beagle Backdoor Connection
highDetects network connections to the Beagle C2 server
Detection queries are available on the platform. Get full rules →
Indicators of compromise
3
domain
| Type | Value |
|---|---|
| domain | claude-pro[.]com |
| domain | vertextrust-advisors[.]com |
| domain | license[.]claude-pro[.]com |