Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Fake OpenClaw Installer to Steal Data

Hackers Exploit Fake OpenClaw Installer to Steal Data

Posted on May 8, 2026 By CWS

A recent infostealer campaign is compromising sensitive data by masquerading as an installer for OpenClaw, an open-source AI assistant. This malware targets over 250 browser extensions related to crypto wallets and password managers. The campaign has been operational since at least February 2026.

Infiltration Through a Fake Website

The attack initiates from a counterfeit website, openclaw-installer.com, registered on March 9, 2026. Visitors are led to download an archive named OpenClaw_x64[.]7z. This file includes a 130MB Rust-based executable with fake documentation to bypass security scans. The size is specifically chosen to evade antivirus file-size checks and automated sandbox limits.

Researchers from Netskope Threat Labs identified this campaign, referring to it as the “Hologram” wave. This marks a more advanced phase of the operation.

Technical Sophistication and Evasion Techniques

The dropper’s manifest clearly identifies itself as “Hologram,” designed for tactical misdirection. When executed, it scrutinizes the environment to determine if it is within a virtual machine or sandbox by checking BIOS strings and hardware profiles.

If genuine user activity, such as mouse movement, is detected, the malware proceeds by disabling Windows Defender, opening firewall ports, and downloading six modular components. These actions are confirmed via a private Telegram channel once successful.

Extensive Credential Theft Strategy

The malware retrieves a targeting list from an attacker-controlled Azure DevOps organization, encompassing 250 browser extensions. This list includes 201 crypto wallets like MetaMask and Coinbase, and 49 password managers such as LastPass and 1Password.

Because the list is stored in a remote Git repository, attackers can update their targets without altering the malware, allowing for quiet expansion. Additionally, it accesses Ledger Live data for dual theft paths.

Infrastructure and Detection Challenges

The campaign’s resilience stems from its dynamic infrastructure management. The command server address is dynamically updated from a Telegram channel description, allowing seamless domain changes. During analysis, the infrastructure was altered before results could be published.

Security teams should focus on behavioral indicators that persist beyond domain shifts, such as large installer files and programmatic firewall rule changes. Simple domain blocking is ineffective; comprehensive application-level inspection is essential.

Conclusion

This campaign demonstrates a sophisticated approach to data theft, with evolving techniques and infrastructure that challenge traditional detection methods. As cyber threats continue to advance, security strategies must adapt to address these emerging challenges effectively.

Cyber Security News Tags:crypto wallets, cyber attack, Cybersecurity, data breach, Hacking, InfoStealer, Malware, Netskope Threat Labs, OpenClaw, password managers

Post navigation

Previous Post: Modular RAT Targets Southeast Asia with Credential Theft

Related Posts

Developers Expose Passwords and API Keys via Online Tools like JSONFormatter Developers Expose Passwords and API Keys via Online Tools like JSONFormatter Cyber Security News
48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild 48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild Cyber Security News
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories Cyber Security News
Qilin Ransomware Exploits RDP History for Network Infiltration Qilin Ransomware Exploits RDP History for Network Infiltration Cyber Security News
North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups Cyber Security News
Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit Fake OpenClaw Installer to Steal Data
  • Modular RAT Targets Southeast Asia with Credential Theft
  • PamDOORa Backdoor Threatens Linux by Stealing SSH Credentials
  • Škoda Online Shop Data Breach Exposes Customer Information
  • New Brazilian Malware Targets Financial Platforms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit Fake OpenClaw Installer to Steal Data
  • Modular RAT Targets Southeast Asia with Credential Theft
  • PamDOORa Backdoor Threatens Linux by Stealing SSH Credentials
  • Škoda Online Shop Data Breach Exposes Customer Information
  • New Brazilian Malware Targets Financial Platforms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark