{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiheruclzdpjfe3vvc2c3ccafo5jzrbrewplpl2ms72f7zl3tsqowu",
"uri": "at://did:plc:xb5etev7ncohgebas3kjeqek/app.bsky.feed.post/3mhbgzvmcbsz2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreibvlvlbnw3hjxmanojdtjiqnfufu4r4po6vcz56em36crpgpb2rzu"
},
"mimeType": "image/jpeg",
"size": 96424
},
"path": "/clickfix-attack-devs-macsync-malware-fake-claude-tools/",
"publishedAt": "2026-03-17T15:23:53.000Z",
"site": "https://hackread.com",
"tags": [
"Security",
"Scams and Fraud",
"AI",
"Claude",
"Claude AI",
"ClickFix",
"Cybersecurity",
"Google",
"MacSync",
"Malware"
],
"textContent": "Cybersecurity researchers at 7AI have revealed a new Claude Fraud campaign in which hackers use fake AI extensions and Google ads to steal data from tech professionals.",
"title": "ClickFix Attack Targets Devs with MacSync Malware via Fake Claude Tools"
}