341 Malicious Clawed Skills Found by the Bot They Were Targeting
A massive malware campaign dubbed ClawHavoc has been uncovered in the ClawHub marketplace, targeting OpenClaw bots and their users. An AI bot named Alex, working with security researcher Oren Yomtov, discovered 341 malicious skills, including 335 from a single campaign. The malware, identified as Atomic Stealer (AMOS), uses sophisticated techniques to evade detection and steal sensitive data. The attack exploits users' trust in AI assistants, potentially compromising personal and financial information. In response, a new tool called Clawdex has been developed to help bots and users scan for malicious skills before installation.
AI Analysis
Technical Summary
The ClawHavoc campaign is a large-scale malware operation targeting the OpenClaw bot ecosystem, discovered through collaboration between an AI bot named Alex and security researcher Oren Yomtov. The campaign involves 341 malicious skills, with 335 originating from a single coordinated effort. The malware payload, Atomic Stealer (AMOS), is designed to stealthily exfiltrate sensitive data such as credentials and cryptocurrency wallet information by exploiting the trust users place in AI assistants. Attackers use typosquatting and supply chain attack techniques to infiltrate the ClawHub marketplace, a platform for distributing OpenClaw bot skills. The malware leverages multiple MITRE ATT&CK techniques including input capture (T1056.001), credential dumping (T1005), and command and control communications (T1071.001), indicating a sophisticated multi-stage attack chain. The campaign infrastructure includes several IP addresses and domains used for hosting malicious payloads and command servers. Although no active exploits have been reported in the wild, the campaign's scale and stealth capabilities pose a significant threat. The development of Clawdex, a scanning tool, aims to help users and bots detect these malicious skills pre-installation, addressing the supply chain risk. The campaign highlights the emerging risks in AI assistant ecosystems where malicious skills can bypass traditional security controls by masquerading as legitimate functionality.
Potential Impact
For European organizations, the ClawHavoc campaign threatens the confidentiality and integrity of sensitive data, particularly personal information and cryptocurrency wallets. Organizations relying on OpenClaw bots or similar AI assistant platforms could face data breaches, financial theft, and reputational damage. The supply chain nature of the attack means that even well-secured environments could be compromised if malicious skills are inadvertently installed. The campaign could disrupt business operations by enabling attackers to execute commands remotely, exfiltrate data, or deploy additional malware. Financial institutions, fintech companies, and enterprises integrating AI assistants into customer service or internal workflows are especially at risk. The exploitation of user trust in AI assistants may lead to widespread compromise if users are not adequately trained or if security controls do not include skill vetting. Given the campaign’s use of advanced evasion techniques, detection and response may be challenging, increasing the potential impact duration and severity.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy focusing on the AI assistant skill supply chain. First, deploy the Clawdex scanning tool or equivalent solutions to analyze and verify all OpenClaw bot skills before installation, ensuring no malicious code is present. Establish strict policies for skill approval, including code review and behavioral analysis, to prevent typosquatting and malicious skill injection. Educate users about the risks of installing unverified skills and the importance of verifying skill sources. Monitor network traffic for indicators of compromise such as connections to the listed IP addresses and domains (e.g., 91.92.242.30, clawdex.koi.security). Implement endpoint detection and response (EDR) solutions capable of identifying suspicious behaviors associated with Atomic Stealer, including credential dumping and unauthorized data exfiltration. Regularly update AI assistant platforms and underlying systems to patch vulnerabilities and reduce attack surface. Collaborate with vendors to enhance supply chain security and share threat intelligence related to ClawHavoc. Finally, conduct incident response drills simulating AI assistant compromise to prepare teams for rapid containment and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
Indicators of Compromise
- ip: 95.92.242.30
- ip: 91.92.242.30
- ip: 96.92.242.30
- hash: 0c76e33ddde228e9ce098edf3bf5f06a
- hash: 3a4450bacf20eea2dcc246da7bce9667
- hash: 8611dfd731c27ac1592de60a31c66634
- hash: 4a99a95d23fd37082675d4804348e8ebdb01e384
- hash: 71f101a613cc57745d4a605d0ce6d3c1cd7a4229
- hash: 8a5a5ff3663c4a530cfe975e66a0257f308368c6
- hash: 0e52566ccff4830e30ef45d2ad804eefba4ffe42062919398bf1334aab74dd65
- hash: 17703b3d5e8e1fe69d6a6c78a240d8c84b32465fe62bed5610fb29335fe42283
- hash: 1e6d4b0538558429422b71d1f4d724c8ce31be92d299df33a8339e32316e2298
- ip: 202.161.50.59
- url: http://91.92.242.30/6x8c0trkp4l9uugo
- url: http://91.92.242.30/7buu24ly8m1tn8m4
- url: http://91.92.242.30/x5ki60w1ih838sp7
- url: http://glot.io/snippets/hfdxv8uyaf
- url: https://clawdex.koi.security
- url: https://install.app-distribution.net/setup/
- domain: clawdex.koi.security
- domain: install.app-distribution.net
341 Malicious Clawed Skills Found by the Bot They Were Targeting
Description
A massive malware campaign dubbed ClawHavoc has been uncovered in the ClawHub marketplace, targeting OpenClaw bots and their users. An AI bot named Alex, working with security researcher Oren Yomtov, discovered 341 malicious skills, including 335 from a single campaign. The malware, identified as Atomic Stealer (AMOS), uses sophisticated techniques to evade detection and steal sensitive data. The attack exploits users' trust in AI assistants, potentially compromising personal and financial information. In response, a new tool called Clawdex has been developed to help bots and users scan for malicious skills before installation.
AI-Powered Analysis
Technical Analysis
The ClawHavoc campaign is a large-scale malware operation targeting the OpenClaw bot ecosystem, discovered through collaboration between an AI bot named Alex and security researcher Oren Yomtov. The campaign involves 341 malicious skills, with 335 originating from a single coordinated effort. The malware payload, Atomic Stealer (AMOS), is designed to stealthily exfiltrate sensitive data such as credentials and cryptocurrency wallet information by exploiting the trust users place in AI assistants. Attackers use typosquatting and supply chain attack techniques to infiltrate the ClawHub marketplace, a platform for distributing OpenClaw bot skills. The malware leverages multiple MITRE ATT&CK techniques including input capture (T1056.001), credential dumping (T1005), and command and control communications (T1071.001), indicating a sophisticated multi-stage attack chain. The campaign infrastructure includes several IP addresses and domains used for hosting malicious payloads and command servers. Although no active exploits have been reported in the wild, the campaign's scale and stealth capabilities pose a significant threat. The development of Clawdex, a scanning tool, aims to help users and bots detect these malicious skills pre-installation, addressing the supply chain risk. The campaign highlights the emerging risks in AI assistant ecosystems where malicious skills can bypass traditional security controls by masquerading as legitimate functionality.
Potential Impact
For European organizations, the ClawHavoc campaign threatens the confidentiality and integrity of sensitive data, particularly personal information and cryptocurrency wallets. Organizations relying on OpenClaw bots or similar AI assistant platforms could face data breaches, financial theft, and reputational damage. The supply chain nature of the attack means that even well-secured environments could be compromised if malicious skills are inadvertently installed. The campaign could disrupt business operations by enabling attackers to execute commands remotely, exfiltrate data, or deploy additional malware. Financial institutions, fintech companies, and enterprises integrating AI assistants into customer service or internal workflows are especially at risk. The exploitation of user trust in AI assistants may lead to widespread compromise if users are not adequately trained or if security controls do not include skill vetting. Given the campaign’s use of advanced evasion techniques, detection and response may be challenging, increasing the potential impact duration and severity.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy focusing on the AI assistant skill supply chain. First, deploy the Clawdex scanning tool or equivalent solutions to analyze and verify all OpenClaw bot skills before installation, ensuring no malicious code is present. Establish strict policies for skill approval, including code review and behavioral analysis, to prevent typosquatting and malicious skill injection. Educate users about the risks of installing unverified skills and the importance of verifying skill sources. Monitor network traffic for indicators of compromise such as connections to the listed IP addresses and domains (e.g., 91.92.242.30, clawdex.koi.security). Implement endpoint detection and response (EDR) solutions capable of identifying suspicious behaviors associated with Atomic Stealer, including credential dumping and unauthorized data exfiltration. Regularly update AI assistant platforms and underlying systems to patch vulnerabilities and reduce attack surface. Collaborate with vendors to enhance supply chain security and share threat intelligence related to ClawHavoc. Finally, conduct incident response drills simulating AI assistant compromise to prepare teams for rapid containment and remediation.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.koi.ai/blog/clawhavoc-341-malicious-clawedbot-skills-found-by-the-bot-they-were-targeting"]
- Adversary
- ClawHavoc
- Pulse Id
- 69833f1ffa4d16b727a549c2
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip95.92.242.30 | — | |
ip91.92.242.30 | — | |
ip96.92.242.30 | — | |
ip202.161.50.59 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash0c76e33ddde228e9ce098edf3bf5f06a | — | |
hash3a4450bacf20eea2dcc246da7bce9667 | — | |
hash8611dfd731c27ac1592de60a31c66634 | — | |
hash4a99a95d23fd37082675d4804348e8ebdb01e384 | — | |
hash71f101a613cc57745d4a605d0ce6d3c1cd7a4229 | — | |
hash8a5a5ff3663c4a530cfe975e66a0257f308368c6 | — | |
hash0e52566ccff4830e30ef45d2ad804eefba4ffe42062919398bf1334aab74dd65 | — | |
hash17703b3d5e8e1fe69d6a6c78a240d8c84b32465fe62bed5610fb29335fe42283 | — | |
hash1e6d4b0538558429422b71d1f4d724c8ce31be92d299df33a8339e32316e2298 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://91.92.242.30/6x8c0trkp4l9uugo | — | |
urlhttp://91.92.242.30/7buu24ly8m1tn8m4 | — | |
urlhttp://91.92.242.30/x5ki60w1ih838sp7 | — | |
urlhttp://glot.io/snippets/hfdxv8uyaf | — | |
urlhttps://clawdex.koi.security | — | |
urlhttps://install.app-distribution.net/setup/ | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainclawdex.koi.security | — | |
domaininstall.app-distribution.net | — |
Threat ID: 6983546df9fa50a62f8fec2c
Added to database: 2/4/2026, 2:15:09 PM
Last enriched: 2/4/2026, 2:29:56 PM
Last updated: 2/7/2026, 2:57:11 AM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-06
MediumThreatFox IOCs for 2026-02-05
MediumTechnical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.