Cybersecurity Today

Fake Claude Code Installs, Arpa Phishing, Iranian and Russian Teams Mount Cyber Retaliation

5 snips
Mar 11, 2026
A scam used Google ads and cloned install pages to trick developers into running malicious terminal commands. Attackers abused .arpa reverse DNS and IPv6 blocks to host stealthy phishing links. A ZIP header manipulation trick hides compressed malware from scanners. Pro-Iranian and pro-Russian hacktivists ramped up DDoS, defacements, breach claims, and disinformation targeting the region.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Fake Claude Install Pages Deliver Credential Stealers

  • Malvertised fake AI code installers trick experienced developers into running malicious terminal commands.
  • Push Security found Google-sponsored ads linking to cloned Claude Code install pages that deploy Amatera/TeraStealer when users paste provided commands.
ADVICE

Treat Pasteable Install Commands As High Risk

  • Revisit developer security practices and treat pasted install commands with suspicion.
  • Push Security warns malicious domains spin up fast and short lifespans mean user caution and hardened controls matter more than IOCs.
INSIGHT

Phishers Weaponize .arpa Reverse DNS To Evade Filters

  • Attackers abused the special-use .arpa reverse DNS to host phishing redirects that evade typical domain reputation checks.
  • They controlled IPv6 allocations and reverse DNS zones to create ANAME records pointing to phishing pages and used TDS filters to avoid analysis.
Get the Snipd Podcast app to discover more snips from this episode
Get the app