Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

341 Malicious Clawed Skills Found by the Bot They Were Targeting

0
Medium
Published: Wed Feb 04 2026 (02/04/2026, 12:44:15 UTC)
Source: AlienVault OTX General

Description

A massive malware campaign dubbed ClawHavoc has been uncovered in the ClawHub marketplace, targeting OpenClaw bots and their users. An AI bot named Alex, working with security researcher Oren Yomtov, discovered 341 malicious skills, including 335 from a single campaign. The malware, identified as Atomic Stealer (AMOS), uses sophisticated techniques to evade detection and steal sensitive data. The attack exploits users' trust in AI assistants, potentially compromising personal and financial information. In response, a new tool called Clawdex has been developed to help bots and users scan for malicious skills before installation.

AI-Powered Analysis

AILast updated: 02/04/2026, 14:29:56 UTC

Technical Analysis

The ClawHavoc campaign is a large-scale malware operation targeting the OpenClaw bot ecosystem, discovered through collaboration between an AI bot named Alex and security researcher Oren Yomtov. The campaign involves 341 malicious skills, with 335 originating from a single coordinated effort. The malware payload, Atomic Stealer (AMOS), is designed to stealthily exfiltrate sensitive data such as credentials and cryptocurrency wallet information by exploiting the trust users place in AI assistants. Attackers use typosquatting and supply chain attack techniques to infiltrate the ClawHub marketplace, a platform for distributing OpenClaw bot skills. The malware leverages multiple MITRE ATT&CK techniques including input capture (T1056.001), credential dumping (T1005), and command and control communications (T1071.001), indicating a sophisticated multi-stage attack chain. The campaign infrastructure includes several IP addresses and domains used for hosting malicious payloads and command servers. Although no active exploits have been reported in the wild, the campaign's scale and stealth capabilities pose a significant threat. The development of Clawdex, a scanning tool, aims to help users and bots detect these malicious skills pre-installation, addressing the supply chain risk. The campaign highlights the emerging risks in AI assistant ecosystems where malicious skills can bypass traditional security controls by masquerading as legitimate functionality.

Potential Impact

For European organizations, the ClawHavoc campaign threatens the confidentiality and integrity of sensitive data, particularly personal information and cryptocurrency wallets. Organizations relying on OpenClaw bots or similar AI assistant platforms could face data breaches, financial theft, and reputational damage. The supply chain nature of the attack means that even well-secured environments could be compromised if malicious skills are inadvertently installed. The campaign could disrupt business operations by enabling attackers to execute commands remotely, exfiltrate data, or deploy additional malware. Financial institutions, fintech companies, and enterprises integrating AI assistants into customer service or internal workflows are especially at risk. The exploitation of user trust in AI assistants may lead to widespread compromise if users are not adequately trained or if security controls do not include skill vetting. Given the campaign’s use of advanced evasion techniques, detection and response may be challenging, increasing the potential impact duration and severity.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy focusing on the AI assistant skill supply chain. First, deploy the Clawdex scanning tool or equivalent solutions to analyze and verify all OpenClaw bot skills before installation, ensuring no malicious code is present. Establish strict policies for skill approval, including code review and behavioral analysis, to prevent typosquatting and malicious skill injection. Educate users about the risks of installing unverified skills and the importance of verifying skill sources. Monitor network traffic for indicators of compromise such as connections to the listed IP addresses and domains (e.g., 91.92.242.30, clawdex.koi.security). Implement endpoint detection and response (EDR) solutions capable of identifying suspicious behaviors associated with Atomic Stealer, including credential dumping and unauthorized data exfiltration. Regularly update AI assistant platforms and underlying systems to patch vulnerabilities and reduce attack surface. Collaborate with vendors to enhance supply chain security and share threat intelligence related to ClawHavoc. Finally, conduct incident response drills simulating AI assistant compromise to prepare teams for rapid containment and remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.koi.ai/blog/clawhavoc-341-malicious-clawedbot-skills-found-by-the-bot-they-were-targeting"]
Adversary
ClawHavoc
Pulse Id
69833f1ffa4d16b727a549c2
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip95.92.242.30
ip91.92.242.30
ip96.92.242.30
ip202.161.50.59

Hash

ValueDescriptionCopy
hash0c76e33ddde228e9ce098edf3bf5f06a
hash3a4450bacf20eea2dcc246da7bce9667
hash8611dfd731c27ac1592de60a31c66634
hash4a99a95d23fd37082675d4804348e8ebdb01e384
hash71f101a613cc57745d4a605d0ce6d3c1cd7a4229
hash8a5a5ff3663c4a530cfe975e66a0257f308368c6
hash0e52566ccff4830e30ef45d2ad804eefba4ffe42062919398bf1334aab74dd65
hash17703b3d5e8e1fe69d6a6c78a240d8c84b32465fe62bed5610fb29335fe42283
hash1e6d4b0538558429422b71d1f4d724c8ce31be92d299df33a8339e32316e2298

Url

ValueDescriptionCopy
urlhttp://91.92.242.30/6x8c0trkp4l9uugo
urlhttp://91.92.242.30/7buu24ly8m1tn8m4
urlhttp://91.92.242.30/x5ki60w1ih838sp7
urlhttp://glot.io/snippets/hfdxv8uyaf
urlhttps://clawdex.koi.security
urlhttps://install.app-distribution.net/setup/

Domain

ValueDescriptionCopy
domainclawdex.koi.security
domaininstall.app-distribution.net

Threat ID: 6983546df9fa50a62f8fec2c

Added to database: 2/4/2026, 2:15:09 PM

Last enriched: 2/4/2026, 2:29:56 PM

Last updated: 2/7/2026, 2:57:11 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats