Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Qihoo 360’s SSL Key Leak: Major Security Breach

Qihoo 360’s SSL Key Leak: Major Security Breach

Posted on March 16, 2026 By CWS

China’s leading cybersecurity company, Qihoo 360, has encountered a significant security lapse by inadvertently embedding its wildcard SSL private key within the installer of its latest AI assistant, 360Qihoo, also known as Security Claw. This critical error was identified on March 16, 2026, and underscores an operational security misstep by a firm entrusted by over 461 million users worldwide.

Discovery of the Security Breach

Security Claw, which is built on the OpenClaw browser framework, contained this vulnerability within its installation package. Lukasz Olejnik, who scrutinized the installer, discovered the unprotected private key nestled in the directory structure. This key, located at /path/to/namiclaw/components/Openclaw/openclaw.7z/credentials, was found to be a live, production-grade wildcard TLS private key.

The certificate associated with this key was issued by WoTrus CA Limited and applied to all subdomains under myclaw[.]360[.]cn. Verifications showed that the certificate and its key matched, confirming their cryptographic relationship. The certificate’s validity spanned from March 12, 2026, to April 12, 2027.

Implications of the Leak

The exposure of an SSL/TLS private key is a severe security threat, potentially enabling various high-stakes attacks. These include man-in-the-middle attacks, server impersonation, credential harvesting, and AI session hijacking, which could affect the entire infrastructure under the myclaw[.]360[.]cn domain. The ramifications of such a compromise are vast, as the key’s coverage extended across all related subdomains.

Despite the certificate’s reported revocation following its public reveal, the OCSP caching behavior might lead some clients to still receive a valid status due to cached responses. This means that the revocation’s effectiveness is neither immediate nor absolute.

Reputation and Industry Impact

This incident is particularly damaging given the timing. Qihoo 360’s founder had recently assured the public of the platform’s security robustness, promising no password leaks. Unfortunately, this assurance was compromised on the very first day of the product’s launch. Qihoo 360, a company valued at $10 billion with a strong security-centric reputation, now faces scrutiny over its secure software development practices.

Such a fundamental security oversight is a stark reminder of the industry’s need for rigorous security protocols. Organizations like Qihoo 360 often warn clients against such lapses, making this incident a significant setback in maintaining consumer trust. For ongoing updates on cybersecurity, follow us on Google News, LinkedIn, and X. Contact us for more insights and stories.

Cyber Security News Tags:AI assistant, credential harvesting, Cybersecurity, man-in-the-middle attack, Qihoo 360, security breach, security flaw, server impersonation, SSL key leak, TLS

Post navigation

Previous Post: AI-Driven Malware ‘Slopoly’ Fuels Hive0163 Ransomware
Next Post: Fake FileZilla Sites Distribute Remote Access Trojan

Related Posts

Penetration Testing in the AI Era Tools and Techniques Penetration Testing in the AI Era Tools and Techniques Cyber Security News
Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework Cyber Security News
Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware Cyber Security News
Remote File Upload Vulnerability in Cisco Meeting Management Remote File Upload Vulnerability in Cisco Meeting Management Cyber Security News
New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection Cyber Security News
Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing
  • AiTM Phishing Attacks Target SaaS Platforms
  • Trellix Reports Source Code Breach Incident

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing
  • AiTM Phishing Attacks Target SaaS Platforms
  • Trellix Reports Source Code Breach Incident

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark