GoPlus Alert: Malicious Clone of the Claude Code Installation Page Appears in Google Search Ads

Gate News, March 11 — GoPlus issued a security alert stating that attackers are using Google search ads to distribute malware that perfectly clones the official Claude Code installation page at a pixel level. This malware can steal user passwords, cookies, session tokens, crypto wallet credentials, and system information. GoPlus recommends users take the following precautions: identify ad labels in search results and carefully verify URL differences from the official website; verify installation methods through official documentation, social media, or GitHub repositories via multiple channels; avoid executing unfamiliar commands directly and analyze command behavior before running; install security plugins to intercept phishing links, risk signatures, authorizations, and transactions in real time.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

CoW Swap Pauses Protocol After DNS Hijacking Drains at Least $1M in User Funds

CoW Swap suspended its protocol after DNS hijacking redirected users to a fraudulent site, resulting in over $1 million in crypto theft. The incident led to precautionary actions and user warnings, while security measures were implemented.

GateNews2h ago

Lattice Announces Shutdown: Redstone Will Close on May 16, Users Must Withdraw by the Deadline

Gaming infrastructure developer Lattice announced it will shut down on May 15 and reminded users to withdraw their funds. After the shutdown, contract funds cannot be withdrawn through L1 contracts; only funds in personal wallets can be recovered. Over the past five years, Lattice has failed to realize its business model and ultimately decided to close, but its MUD framework and DUST game will continue to run.

MarketWhisper3h ago

User Loses $316K USDC After Signing Malicious Permit2 Transaction, GoPlus Warns

A user lost $316,000 in USDC due to a malicious Permit2 transaction, highlighting vulnerabilities in token approval mechanisms. GoPlus Security urges users to avoid phishing by following key security practices and installing its protective extension.

GateNews4h ago

Cow Protocol suffers a DNS hijacking; users must immediately revoke permissions

Cow Swap, a DEX aggregation platform built by Cow Protocol, suffered DNS hijacking on April 14. The attacker tampered with domain name records, redirecting user traffic to a spoofed website, and deployed a wallet-draining script. Cow DAO immediately paused the service and advised users to revoke approvals. This incident did not affect the protocol’s smart contracts, but users should remain alert to related risks and verify their transaction records.

MarketWhisper5h ago

CoW Swap Issues Security Alert After Frontend Attack Detected by Blockaid

Blockaid has identified a frontend attack on CoW Swap, marking its domain as malicious. Users are advised to cease interactions, revoke wallet authorizations, and await further updates from the CoW Swap team.

GateNews11h ago
Comment
0/400
No comments