{"id":3489215,"date":"2026-04-05T08:56:05","date_gmt":"2026-04-05T08:56:05","guid":{"rendered":"https:\/\/techingeek.com\/index.php\/2026\/04\/05\/hackers-distribute-claude-code-breach-with-additional-malware\/"},"modified":"2026-04-05T08:56:05","modified_gmt":"2026-04-05T08:56:05","slug":"hackers-distribute-claude-code-breach-with-additional-malware","status":"publish","type":"post","link":"https:\/\/techingeek.com\/index.php\/2026\/04\/05\/hackers-distribute-claude-code-breach-with-additional-malware\/","title":{"rendered":"Hackers Distribute Claude Code Breach with Additional Malware"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/69d03b9326dd2d3a7ba902f2\/191:100\/w_1280,c_limit\/security_roundup_claude_GettyImages-2181575875.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"lead-in-text-callout\">An investigation by WIRED<\/span> utilizing records from the Department of Homeland Security this week <a href=\"https:\/\/www.wired.com\/story\/border-patrol-bortac-borstar-use-of-force-midway-blitz\/\" class=\"text link\">uncovered the identities of paramilitary Border Patrol agents<\/a> who often employed force against civilians during Operation Midway Blitz in Chicago last autumn. Several of the agents, according to WIRED, also participated in similar operations in various states across the US.<\/p>\n<p>Customs and Border Protection might want to consider safeguarding its sensitive facility information. Through simple Google searches, WIRED found flashcards created by users on the online learning site Quizlet that <a href=\"https:\/\/www.wired.com\/story\/cbp-facility-codes-sure-seem-to-have-leaked-via-online-flashcards\/\" class=\"text link\">included gate codes for CBP facilities<\/a> and more.<\/p>\n<p>In an unusual decision, Apple this week <a href=\"https:\/\/www.wired.com\/story\/apple-will-push-out-rare-backported-patches-to-protect-ios-18-users-from-darksword-hacking-tool\/\" class=\"text link\">issued \u201cbackported\u201d patches for iOS 18<\/a> to safeguard millions of users still utilizing the older operating system from the <a href=\"https:\/\/www.wired.com\/story\/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild\/\" class=\"text link\">DarkSword hacking method<\/a> that was discovered being used in the wild. Found in March, DarkSword enables attackers to compromise iPhones that simply visit a website containing the takeover tools. Apple first encouraged users to upgrade to the latest version of its OS, iOS 26, but eventually released the iOS 18 patches as DarkSword continued to proliferate.<\/p>\n<p>The US-Israel conflict with Iran entered its second month this week, with Iran issuing threats to <a href=\"https:\/\/www.wired.com\/story\/iran-threatens-to-start-attacking-major-us-tech-firms-on-april-1\/\" class=\"text link\">initiate attacks on over a dozen US companies<\/a>, including major tech firms like Apple, Google, and Microsoft, which operate offices and data centers in the Gulf region. The perilous conflict, with no clear resolution in sight, continues to devastate the global economy as <a href=\"https:\/\/www.wired.com\/story\/legal-loopholes-leave-shipping-crews-stranded-in-the-strait-of-hormuz\/\" class=\"text link\">shipping crews remain stuck in the Strait of Hormuz<\/a>, a vital trade passage. Meanwhile, some are starting to ponder what might occur <a href=\"https:\/\/www.wired.com\/story\/heres-what-can-happen-when-the-us-bombs-irans-nuclear-sites\/\" class=\"text link\">if US strikes inflict significant damage on Iran\u2019s nuclear sites<\/a>.<\/p>\n<p>And that\u2019s not everything! Each week, we compile the security and privacy updates we didn\u2019t delve into more comprehensively. Click on the headlines to read the complete stories. And stay safe out there.<\/p>\n<p>Earlier this week, a security expert pointed out that Anthropic inadvertently made the source code for its well-known vibe-coding tool, Claude Code, public. Instantly, individuals began sharing the code on the developer platform GitHub. But be cautious if you wish to download some of those repositories: BleepingComputer warns that some of the individuals posting are actually hackers who have embedded a piece of <a href=\"https:\/\/www.wired.com\/story\/infostealer-malware-password-theft\/\" class=\"text link\">infostealer<\/a> malware within the lines of code.<\/p>\n<p>Anthropic, for its part, has been actively working to eliminate copies of the leak (malware-laden or otherwise) by sending out copyright takedown requests. The Wall Street Journal &lt;a href=&quot;https:\/\/www.wsj.com\/tech\/ai\/anthropic-races-to-contain-leak-of-code-behind-claude-ai-agent-4bc5acc7?gaa_at=eafs&amp;gaa_n=AWEtsqe0YqHxbezGhAXCQMkTM704xLIzPtDKH78qcGbyQlXZjxZuAmm8TxwV4QxfOvM%3D&amp;gaa_ts=69<\/p>\n","protected":false},"excerpt":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/69d03b9326dd2d3a7ba902f2\/191:100\/w_1280,c_limit\/security_roundup_claude_GettyImages-2181575875.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"lead-in-text-callout\">An investigation by WIRED<\/span> utilizing records from the Department of Homeland Security this week <a href=\"https:\/\/www.wired.com\/story\/border-patrol-bortac-borstar-use-of-force-midway-blitz\/\" class=\"text link\">uncovered the identities of paramilitary Border Patrol agents<\/a> who often employed force against civilians during Operation Midway Blitz in Chicago last autumn. Several of the agents, according to WIRED, also participated in similar operations in various states across the US.<\/p>\n<p>Customs and Border Protection might want to consider safeguarding its sensitive facility information. Through simple Google searches, WIRED found flashcards created by users on the online learning site Quizlet that <a href=\"https:\/\/www.wired.com\/story\/cbp-facility-codes-sure-seem-to-have-leaked-via-online-flashcards\/\" class=\"text link\">included gate codes for CBP facilities<\/a> and more.<\/p>\n<p>In an unusual decision, Apple this week <a href=\"https:\/\/www.wired.com\/story\/apple-will-push-out-rare-backported-patches-to-protect-ios-18-users-from-darksword-hacking-tool\/\" class=\"text link\">issued \u201cbackported\u201d patches for iOS 18<\/a> to safeguard millions of users still utilizing the older operating system from the <a href=\"https:\/\/www.wired.com\/story\/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild\/\" class=\"text link\">DarkSword hacking method<\/a> that was discovered being used in the wild. Found in March, DarkSword enables attackers to compromise iPhones that simply visit a website containing the takeover tools. Apple first encouraged users to upgrade to the latest version of its OS, iOS 26, but eventually released the iOS 18 patches as DarkSword continued to proliferate.<\/p>\n<p>The US-Israel conflict with Iran entered its second month this week, with Iran issuing threats to <a href=\"https:\/\/www.wired.com\/story\/iran-threatens-to-start-attacking-major-us-tech-firms-on-april-1\/\" class=\"text link\">initiate attacks on over a dozen US companies<\/a>, including major tech firms like Apple, Google, and Microsoft, which operate offices and data centers in the Gulf region. The perilous conflict, with no clear resolution in sight, continues to devastate the global economy as <a href=\"https:\/\/www.wired.com\/story\/legal-loopholes-leave-shipping-crews-stranded-in-the-strait-of-hormuz\/\" class=\"text link\">shipping crews remain stuck in the Strait of Hormuz<\/a>, a vital trade passage. Meanwhile, some are starting to ponder what might occur <a href=\"https:\/\/www.wired.com\/story\/heres-what-can-happen-when-the-us-bombs-irans-nuclear-sites\/\" class=\"text link\">if US strikes inflict significant damage on Iran\u2019s nuclear sites<\/a>.<\/p>\n<p>And that\u2019s not everything! Each week, we compile the security and privacy updates we didn\u2019t delve into more comprehensively. Click on the headlines to read the complete stories. And stay safe out there.<\/p>\n<p>Earlier this week, a security expert pointed out that Anthropic inadvertently made the source code for its well-known vibe-coding tool, Claude Code, public. Instantly, individuals began sharing the code on the developer platform GitHub. But be cautious if you wish to download some of those repositories: BleepingComputer warns that some of the individuals posting are actually hackers who have embedded a piece of <a href=\"https:\/\/www.wired.com\/story\/infostealer-malware-password-theft\/\" class=\"text link\">infostealer<\/a> malware within the lines of code.<\/p>\n<p>Anthropic, for its part, has been actively working to eliminate copies of the leak (malware-laden or otherwise) by sending out copyright takedown requests. The Wall Street Journal &lt;a href=&quot;https:\/\/www.wsj.com\/tech\/ai\/anthropic-races-to-contain-leak-of-code-behind-claude-ai-agent-4bc5acc7?gaa_at=eafs&amp;gaa_n=AWEtsqe0YqHxbezGhAXCQMkTM704xLIzPtDKH78qcGbyQlXZjxZuAmm8TxwV4QxfOvM%3D&amp;gaa_ts=69<\/p>\n","protected":false},"author":2,"featured_media":3489216,"comment_status":"open","ping_status":"closed","sticky":false,"template":"Default","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[92,84,353,70,352,116,354,67,69,351],"class_list":["post-3489215","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-apple","tag-artificial-intelligence","tag-cisco","tag-cybersecurity","tag-fbi","tag-hacking","tag-ios","tag-malware","tag-security","tag-security-roundup"],"_links":{"self":[{"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/posts\/3489215"}],"collection":[{"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/comments?post=3489215"}],"version-history":[{"count":0,"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/posts\/3489215\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/media\/3489216"}],"wp:attachment":[{"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/media?parent=3489215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/categories?post=3489215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/tags?post=3489215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}