Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Abuses AI Platforms Hugging Face and ClawHub

Malware Abuses AI Platforms Hugging Face and ClawHub

Posted on May 8, 2026 By CWS

An ongoing campaign has surfaced, leveraging AI platforms Hugging Face and ClawHub to distribute malware. This operation involves the deployment of trojans, cryptominers, and infostealers under the guise of legitimate AI tools and extensions.

The attack represents a significant development in supply chain threats, transitioning from traditional software repositories to trusted AI environments. According to Acronis TRU, 575 malicious skills were identified within the OpenClaw ecosystem on ClawHub, spread across 13 developer accounts.

Key Threat Actors and Techniques

The campaign is largely orchestrated by two main threat actors: “hightower6eu,” accountable for 334 malicious skills (58%), and “sakaen736jih,” who managed 199 skills (34.6%). The remaining accounts contributed a smaller number of malicious activities. These skills appear as beneficial tools, such as a YouTube transcript summarizer, but covertly prompt users to download password-protected files or execute encoded commands.

For Windows targets, trojans packed with VMProtect were detected. MacOS targets experienced a base64-encoded command that linked to an external IP (91.92.242[.]30) to download and execute the AMOS Stealer, a macOS-specific infostealer available as malware-as-a-service through various channels.

Advanced Malware Deployment

A second Windows payload utilized a 30-byte XOR key for runtime string decryption, dynamically resolving NT APIs, and conducting in-memory process injection into explorer.exe. This injected code initiated AES-encrypted C2 communication over HTTPS to a malicious site and downloaded a cryptominer disguised as svchost.exe, ensuring persistence through scheduled tasks and alterations to Windows Defender exclusion paths.

The ClawHub campaign prominently features indirect prompt injection, embedding hidden instructions within skill files that AI agents unknowingly execute, thereby broadening the attack’s reach beyond the initial target.

Impact on AI Platforms

Hugging Face, hosting over a million machine learning models, was found to be a platform for hosting multi-stage infection chains, affecting Windows, Linux, and Android systems. Notably, the ITHKRPAW campaign targeted Vietnamese financial organizations, using malicious files to invoke Cloudflare Workers for payload delivery, masked by a decoy image.

The FAKESECURITY campaign utilized a batch script to download an obfuscated secondary script from Hugging Face, bypassing security measures and injecting shellcode into explorer.exe, masquerading as Windows Security.

Future Outlook and Recommendations

Organizations and developers should treat AI models, datasets, and agent extensions as potentially untrusted inputs, requiring rigorous validation akin to any third-party code. Key steps include auditing OpenClaw skills for encoded commands, monitoring for unusual process injections into explorer.exe, blocking known malicious indicators, and enforcing restrictions on Windows Defender exclusion path changes via Group Policy.

As cybercriminals increasingly exploit supply chains, organizations must bolster their defenses to protect against these sophisticated entry points.

Cyber Security News Tags:Acronis TRU, AI platforms, ClawHub, Cryptominers, Cybersecurity, Hugging Face, Infostealers, macOS, Malware, OpenClaw, supply chain attack, Threat Actors, Trojans, Windows

Post navigation

Previous Post: ZiChatBot Malware Exploits Zulip APIs for Stealth Operations
Next Post: Fraudulent Android Apps Stole Millions via Fake Subscriptions

Related Posts

Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof Cyber Security News
New ‘Sindoor Dropper’ Malware Targets Linux Systems with Weaponized .desktop Files New ‘Sindoor Dropper’ Malware Targets Linux Systems with Weaponized .desktop Files Cyber Security News
Better Auth API keys Vulnerability Let Attackers Create Privileged Credentials For Arbitrary Users Better Auth API keys Vulnerability Let Attackers Create Privileged Credentials For Arbitrary Users Cyber Security News
US Confirms Shutdown of BlackSuit Ransomware That Hacked Over 450 Organizations US Confirms Shutdown of BlackSuit Ransomware That Hacked Over 450 Organizations Cyber Security News
Vimeo Data Breach Exposes User Database Details Vimeo Data Breach Exposes User Database Details Cyber Security News
Citrix NetScaler Threat: Immediate Action Required Citrix NetScaler Threat: Immediate Action Required Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fraudulent Android Apps Stole Millions via Fake Subscriptions
  • Malware Abuses AI Platforms Hugging Face and ClawHub
  • ZiChatBot Malware Exploits Zulip APIs for Stealth Operations
  • Cybersecurity: Key Developments and Emerging Threats
  • Trellix Data Breach Exposes Source Code to RansomHouse

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fraudulent Android Apps Stole Millions via Fake Subscriptions
  • Malware Abuses AI Platforms Hugging Face and ClawHub
  • ZiChatBot Malware Exploits Zulip APIs for Stealth Operations
  • Cybersecurity: Key Developments and Emerging Threats
  • Trellix Data Breach Exposes Source Code to RansomHouse

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark