Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

Posted on February 2, 2026February 2, 2026 By CWS

A safety audit of two,857 expertise on ClawHub has discovered 341 malicious expertise throughout a number of campaigns, based on new findings from Koi Safety, exposing customers to new provide chain dangers.
ClawHub is a market designed to make it straightforward for OpenClaw customers to seek out and set up third-party expertise. It is an extension to the OpenClaw venture, a self-hosted synthetic intelligence (AI) assistant previously often called each Clawdbot and Moltbot.
The evaluation, which Koi performed with the assistance of an OpenClaw bot named Alex, discovered that 335 expertise use pretend pre-requisites to put in an Apple macOS stealer named Atomic Stealer (AMOS). This set has been codenamed ClawHavoc.
“You put in what appears like a reliable talent – perhaps solana-wallet-tracker or youtube-summarize-pro,” Koi researcher Oren Yomtov stated. “The talent’s documentation appears skilled. However there is a ‘Conditions’ part that claims that you must set up one thing first.”
This step includes directions for each Home windows and macOS programs: On Home windows, customers are requested to obtain a file referred to as “openclaw-agent.zip” from a GitHub repository. On macOS, the documentation tells them to repeat an set up script hosted at glot[.]io and paste it into the Terminal app. The concentrating on of macOS isn’t any coincidence, as reviews have emerged of individuals shopping for Mac Minis to run the AI assistant 24×7.
Current inside the password-protected archive is a trojan with keylogging performance to seize API keys, credentials, and different delicate knowledge on the machine, together with people who the bot already has entry to. Then again, the glot[.]io script incorporates obfuscated shell instructions to fetch next-stage payloads from an attacker-controlled infrastructure.

This, in flip, entails reaching out to a different IP deal with (“91.92.242[.]30”) to retrieve one other shell script, which is configured to contact the identical server to acquire a common Mach-O binary that reveals traits in line with Atomic Stealer, a commodity stealer obtainable for $500-1000/month that may harvest knowledge from macOS hosts.

In response to Koi, the malicious expertise masquerade as

ClawHub typosquats (e.g., clawhub, clawhub1, clawhubb, clawhubcli, clawwhub, cllawhub)
Cryptocurrency instruments like Solana wallets and pockets trackers
Polymarket bots (e.g., polymarket-trader, polymarket-pro, polytrading)
YouTube utilities (e.g., youtube-summarize, youtube-thumbnail-grabber, youtube-video-downloader)
Auto-updaters (e.g., auto-updater-agent, replace, updater)
Finance and social media instruments (e.g., yahoo-finance-pro, x-trends-tracker)
Google Workspace instruments claiming integrations with Gmail, Calendar, Sheets, and Drive
Ethereum fuel trackers
Misplaced Bitcoin finders

As well as, the cybersecurity firm stated it recognized expertise that disguise reverse shell backdoors inside practical code (e.g., better-polymarket and polymarket-all-in-one), or exfiltrate bot credentials current in “~/.clawdbot/.env” to a webhook[.]web site (e.g., rankaj).

The event coincides with a report from OpenSourceMalware, which additionally flagged the identical ClawHavoc marketing campaign concentrating on OpenClaw customers.
“The talents masquerade as cryptocurrency buying and selling automation instruments and ship information-stealing malware to macOS and Home windows programs,” a safety researcher who goes by the net alias 6mile stated.
“All these expertise share the identical command-and-control infrastructure (91.92.242[.]30) and use subtle social engineering to persuade customers to execute malicious instructions, which then steal crypto belongings like alternate API keys, pockets personal keys, SSH credentials, and browser passwords.”
OpenClaw Provides a Reporting Choice
The issue stems from the truth that ClawHub is open by default and permits anybody to add expertise. The one restriction at this stage is {that a} writer will need to have a GitHub account that is not less than one week previous.
The problem with malicious expertise hasn’t gone unnoticed by OpenClaw’s creator Peter Steinberger, who has since rolled out a reporting characteristic that permits signed-in customers to flag a talent. “Every consumer can have as much as 20 lively reviews at a time,” the documentation states. “Abilities with greater than 3 distinctive reviews are auto-hidden by default.”

The findings underscore how open-source ecosystems proceed to be abused by menace actors, who are actually piggybacking on OpenClaw’s sudden recognition to orchestrate malicious campaigns and distribute malware at scale.
In a report final week, Palo Alto Networks warned that OpenClaw represents what British programmer Simon Willison, who coined the time period immediate injection, describes as a “deadly trifecta” that renders AI brokers susceptible by design attributable to their entry to non-public knowledge, publicity to untrusted content material, and the power to speak externally.
The intersection of those three capabilities, mixed with OpenClaw’s persistent reminiscence, “acts as an accelerant” and amplifies the dangers, the cybersecurity firm added.
“With persistent reminiscence, assaults are now not simply point-in-time exploits. They turn into stateful, delayed-execution assaults,” researchers Sailesh Mishra and Sean P. Morgan stated. “Malicious payloads now not must set off rapid execution on supply. As a substitute, they are often fragmented, untrusted inputs that seem benign in isolation, are written into long-term agent reminiscence, and later assembled into an executable set of directions.”
“This permits time-shifted immediate injection, reminiscence poisoning, and logic bomb–fashion activation, the place the exploit is created at ingestion however detonates solely when the agent’s inner state, objectives, or device availability align.”

The Hacker News Tags:ClawHub, Data, Find, Malicious, OpenClaw, Researchers, Skills, Stealing, Users

Post navigation

Previous Post: DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
Next Post: Notepad++ Compromised by Chinese APT Group with Custom Malware

Related Posts

Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack The Hacker News
Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading The Hacker News
AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown The Hacker News
Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks The Hacker News
U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues The Hacker News
Asian Cyber Group Infiltrates 70 Global Organizations Asian Cyber Group Infiltrates 70 Global Organizations The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News