Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Dangerous npm Package Steals macOS Credentials

Dangerous npm Package Steals macOS Credentials

Posted on March 9, 2026 By CWS

Cybersecurity experts have raised alarms over a deceptive npm package pretending to be an OpenClaw installer. This package, identified as “@openclaw-ai/openclawai,” is designed to deploy a remote access trojan (RAT) and extract sensitive data from infected systems. Cybersecurity firm JFrog discovered this package, which was uploaded by a user named “openclaw-ai” on March 3, 2026, and has since been downloaded 178 times.

Detailed Analysis of the Threat

The malicious package primarily targets macOS users, aiming to collect a wide range of data. According to JFrog, it captures system credentials, browser information, cryptocurrency wallets, SSH keys, and iMessage history. It also installs a persistent RAT with capabilities for remote access, a SOCKS5 proxy, and live browser session duplication. Security researcher Meitar Palas noted the attack’s extensive data collection and sophisticated infrastructure.

The package activates its malicious functions through a postinstall hook, which reinstalls it globally with the command “npm i -g @openclaw-ai/openclawai.” This command turns the package into a globally accessible command-line tool by utilizing the “bin” property in the “package.json” file, pointing to “scripts/setup.js.”

How the Malware Operates

The “setup.js” file serves as the initial dropper, creating a fake command-line interface that simulates the OpenClaw installation process. This deception includes animated progress bars and a false iCloud Keychain prompt requesting the user’s system password. Concurrently, it downloads an encrypted second-stage payload from a command-and-control (C2) server, which is then decrypted and executed in the background.

This second-stage payload, a comprehensive information stealer, encompasses 11,700 lines of JavaScript. It can persistently collect data, decrypt browser information, and communicate with C2 servers. The malware gathers data from macOS Keychain, browser credentials, cryptocurrency wallets, and developer cloud credentials. It also targets AI agent configurations and data protected by Full Disk Access (FDA), such as Apple Notes and Safari history.

Implications and Future Outlook

The stolen data is archived into a tar.gz file and exfiltrated through several channels, including the C2 server and Telegram Bot API. The malware can operate in a daemon mode, monitoring clipboard content for specific patterns and executing commands from the C2 server. This includes actions like running arbitrary shell commands, opening URLs, and cloning browser profiles.

Security experts emphasize the sophisticated social engineering tactics used by this package, which makes it a significant threat to developers and organizations. The deceptive CLI installer and Keychain prompt effectively extract system passwords, enabling macOS Keychain decryption and browser credential extraction.

The discovery of this malicious npm package highlights the importance of vigilance in software installations and the need for robust cybersecurity measures. Users are advised to review npm packages carefully and ensure their systems are protected against such advanced threats.

The Hacker News Tags:browser security, Credentials, Cybersecurity, data theft, JFrog, macOS, NPM, OpenClaw, RAT, social engineering

Post navigation

Previous Post: Vietnam Cybercrime Network Fuels Global Account Fraud
Next Post: M365Pwned Toolkit Enhances Microsoft 365 Exploitation

Related Posts

Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks The Hacker News
OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls The Hacker News
Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike The Hacker News
Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware The Hacker News
Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access The Hacker News
SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions
  • M365Pwned Toolkit Enhances Microsoft 365 Exploitation
  • Dangerous npm Package Steals macOS Credentials
  • Vietnam Cybercrime Network Fuels Global Account Fraud
  • Signal Faces Surge in Phishing Attacks Against Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions
  • M365Pwned Toolkit Enhances Microsoft 365 Exploitation
  • Dangerous npm Package Steals macOS Credentials
  • Vietnam Cybercrime Network Fuels Global Account Fraud
  • Signal Faces Surge in Phishing Attacks Against Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News