Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious Skills Found in OpenClaw’s ClawHub Marketplace

Malicious Skills Found in OpenClaw’s ClawHub Marketplace

Posted on February 18, 2026 By CWS

In a significant cybersecurity breach, the ClawHub marketplace of OpenClaw, an open-source AI platform, has been compromised by a campaign known as ClawHavoc. This operation involved the distribution of 1,184 malicious ‘Skills’ that facilitated data theft and unauthorized system access.

Details of the ClawHavoc Campaign

OpenClaw, which supports user-installed plugins called Skills, was infiltrated in late January 2026. Various attackers, masquerading as developers, uploaded trojanized Skills disguised as crypto trading bots and productivity tools. The breach was first made public by Koi Security on February 1, 2026, and the malware has been identified by Antiy CERT as the TrojanOpenClaw PolySkill family.

By February 5, researchers had linked 1,184 malicious uploads to 12 developer accounts, with a single entity responsible for 677 of these. The attackers leveraged ClawHub’s lax upload policies, allowing any GitHub account older than a week to publish Skills.

Techniques and Tactics Used

The malicious Skills were packed in ZIP files containing deceptive configuration scripts. Antiy has documented three primary malware behaviors: ClickFix-style downloaders, reverse-shell droppers, and direct data-stealing scripts. These tactics ranged from tricking users into executing harmful binaries to deploying reverse shells for remote access.

One notable method involved redirecting users to password-protected malware archives, prompting them to install harmful components. In particular, macOS users were targeted with a variant of the Atomic macOS Stealer, which siphoned off sensitive data such as browser credentials and crypto wallet information.

The Wider Impact and Response

The ClawHavoc campaign has underscored vulnerabilities in nascent AI marketplaces, highlighting the need for better security measures and governance. The rapid spread of these malicious Skills suggests that thousands of systems might have been compromised before any remedial action could be taken.

Security experts have recommended users audit their installed Skills, eliminate suspicious entries, update credentials, and employ endpoint protection to monitor activities at the agent level. ClawHavoc serves as a cautionary tale of the potential risks in AI supply chains and the critical need for robust marketplace oversight.

Stay informed about the latest in cybersecurity by following us on Google News, LinkedIn, and X. For more information or to share your stories, contact us directly.

Cyber Security News Tags:AI security, Antiy CERT, backdoor access, ClawHavoc, ClawHub, ClickFix, Cybersecurity, data theft, Koi Security, Malware, OpenClaw, reverse shell, supply chain attack, TrojanOpenClaw

Post navigation

Previous Post: Critical Flaw in Grandstream VoIP Phones Enables Remote Hacking
Next Post: Cellebrite Technology Utilized on Kenyan Activist’s Phone

Related Posts

Microsoft Defender for Office 365 New Dashboard to Provide More Details Across a Range of Threat Vectors Microsoft Defender for Office 365 New Dashboard to Provide More Details Across a Range of Threat Vectors Cyber Security News
List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities Cyber Security News
Windows BitLocker Vulnerability Let Attackers Elevate Privileges Windows BitLocker Vulnerability Let Attackers Elevate Privileges Cyber Security News
CISA Urges Action on Windows ActiveX RCE Flaw CISA Urges Action on Windows ActiveX RCE Flaw Cyber Security News
Hackers Actively Attacking Cisco and Palo Alto Networks VPN Gateways to Gain Login Access Hackers Actively Attacking Cisco and Palo Alto Networks VPN Gateways to Gain Login Access Cyber Security News
Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • MacOS Developers Targeted by Cuckoo Stealer via Fake Homebrew
  • Cellebrite Technology Utilized on Kenyan Activist’s Phone
  • Malicious Skills Found in OpenClaw’s ClawHub Marketplace
  • Critical Flaw in Grandstream VoIP Phones Enables Remote Hacking
  • OpenClaw AI Enhances Security and Anthropic Support

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • MacOS Developers Targeted by Cuckoo Stealer via Fake Homebrew
  • Cellebrite Technology Utilized on Kenyan Activist’s Phone
  • Malicious Skills Found in OpenClaw’s ClawHub Marketplace
  • Critical Flaw in Grandstream VoIP Phones Enables Remote Hacking
  • OpenClaw AI Enhances Security and Anthropic Support

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News