Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dangerous npm Package Steals macOS Credentials

Dangerous npm Package Steals macOS Credentials

Posted on March 9, 2026 By CWS

Cybersecurity experts have raised alarms over a deceptive npm package pretending to be an OpenClaw installer. This package, identified as “@openclaw-ai/openclawai,” is designed to deploy a remote access trojan (RAT) and extract sensitive data from infected systems. Cybersecurity firm JFrog discovered this package, which was uploaded by a user named “openclaw-ai” on March 3, 2026, and has since been downloaded 178 times.

Detailed Analysis of the Threat

The malicious package primarily targets macOS users, aiming to collect a wide range of data. According to JFrog, it captures system credentials, browser information, cryptocurrency wallets, SSH keys, and iMessage history. It also installs a persistent RAT with capabilities for remote access, a SOCKS5 proxy, and live browser session duplication. Security researcher Meitar Palas noted the attack’s extensive data collection and sophisticated infrastructure.

The package activates its malicious functions through a postinstall hook, which reinstalls it globally with the command “npm i -g @openclaw-ai/openclawai.” This command turns the package into a globally accessible command-line tool by utilizing the “bin” property in the “package.json” file, pointing to “scripts/setup.js.”

How the Malware Operates

The “setup.js” file serves as the initial dropper, creating a fake command-line interface that simulates the OpenClaw installation process. This deception includes animated progress bars and a false iCloud Keychain prompt requesting the user’s system password. Concurrently, it downloads an encrypted second-stage payload from a command-and-control (C2) server, which is then decrypted and executed in the background.

This second-stage payload, a comprehensive information stealer, encompasses 11,700 lines of JavaScript. It can persistently collect data, decrypt browser information, and communicate with C2 servers. The malware gathers data from macOS Keychain, browser credentials, cryptocurrency wallets, and developer cloud credentials. It also targets AI agent configurations and data protected by Full Disk Access (FDA), such as Apple Notes and Safari history.

Implications and Future Outlook

The stolen data is archived into a tar.gz file and exfiltrated through several channels, including the C2 server and Telegram Bot API. The malware can operate in a daemon mode, monitoring clipboard content for specific patterns and executing commands from the C2 server. This includes actions like running arbitrary shell commands, opening URLs, and cloning browser profiles.

Security experts emphasize the sophisticated social engineering tactics used by this package, which makes it a significant threat to developers and organizations. The deceptive CLI installer and Keychain prompt effectively extract system passwords, enabling macOS Keychain decryption and browser credential extraction.

The discovery of this malicious npm package highlights the importance of vigilance in software installations and the need for robust cybersecurity measures. Users are advised to review npm packages carefully and ensure their systems are protected against such advanced threats.

The Hacker News Tags:browser security, Credentials, Cybersecurity, data theft, JFrog, macOS, NPM, OpenClaw, RAT, social engineering

Post navigation

Previous Post: Vietnam Cybercrime Network Fuels Global Account Fraud
Next Post: M365Pwned Toolkit Enhances Microsoft 365 Exploitation

Related Posts

Malicious Chrome Extensions Target Google and Telegram Data Malicious Chrome Extensions Target Google and Telegram Data The Hacker News
CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users The Hacker News
FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware The Hacker News
PowMix Botnet Targets Czech Workforce with Stealth Tactics PowMix Botnet Targets Czech Workforce with Stealth Tactics The Hacker News
Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 The Hacker News
LeakNet Ransomware Adopts ClickFix for Attacks LeakNet Ransomware Adopts ClickFix for Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • US Targets Chinese Firms Exploiting AI Innovations
  • Hackers Target Developers with Fake Job Interviews
  • Unauthorized Mythos Access & CISA Nomination Withdrawal
  • NASA Targeted in Chinese Phishing Attack on Defense Software
  • Pastebin PowerShell Script Targets Telegram Sessions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • US Targets Chinese Firms Exploiting AI Innovations
  • Hackers Target Developers with Fake Job Interviews
  • Unauthorized Mythos Access & CISA Nomination Withdrawal
  • NASA Targeted in Chinese Phishing Attack on Defense Software
  • Pastebin PowerShell Script Targets Telegram Sessions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark