GhostClaw expands beyond npm: GitHub repositories and AI workflows deliver macOS infostealer
The GhostClaw malware campaign has expanded its distribution methods beyond npm packages to include GitHub repositories and AI-assisted development workflows. The attackers impersonate legitimate tools and utilize multi-stage payloads to steal credentials and retrieve additional malicious code. The infection chain involves executing shell commands, presenting fake authentication prompts, and establishing persistence. The campaign leverages both manual installation through README instructions and automated AI-assisted workflows. Multiple GitHub repositories have been identified, all communicating with a common command-and-control infrastructure. This shift in tactics allows the attackers to target a broader range of victims, including developers and users of AI-assisted coding tools.
AI Analysis
Technical Summary
GhostClaw is a macOS infostealer malware campaign that has recently expanded its distribution vectors beyond npm packages to include GitHub repositories and AI-assisted development workflows. The attackers behind GhostClaw impersonate legitimate developer tools and repositories to trick victims into executing multi-stage payloads. The infection chain typically involves executing shell commands to download and run malicious components, presenting fake authentication dialogs to harvest credentials, and establishing persistence mechanisms to maintain long-term access. The campaign leverages both manual installation via README instructions and automated AI-assisted workflows, increasing the likelihood of infection among developers and users of AI coding tools. Multiple GitHub repositories have been identified as distribution points, all linking back to a common command-and-control (C2) infrastructure, enabling remote control and additional payload delivery. The malware employs obfuscation and evasion techniques such as masquerading as legitimate software, multi-stage payloads, and persistence via system modifications. While no CVEs or known exploits have been reported, the campaign represents a sophisticated supply chain attack targeting macOS environments. The use of AI-assisted workflows as a distribution vector is a novel tactic that broadens the attack surface and complicates detection. Indicators of compromise include specific file hashes and the domain trackpipe.dev used for C2 communications. The campaign’s tactics align with MITRE ATT&CK techniques such as T1204.002 (User Execution), T1036 (Masquerading), T1064 (Scripting), T1528 (Steal Credentials), T1547.001 (Persistence via Launch Agents), T1056.002 (Credential API Hooking), T1059.004 (Command and Scripting Interpreter: AppleScript), T1027 (Obfuscated Files or Information), T1102.002 (Web Service), and T1105 (Ingress Tool Transfer).
Potential Impact
This threat poses significant risks to organizations and individual developers using macOS systems, especially those involved in software development and AI-assisted coding workflows. Credential theft can lead to unauthorized access to sensitive systems, source code repositories, and internal networks, potentially resulting in intellectual property theft, data breaches, and further malware deployment. The use of GitHub repositories and AI workflows as infection vectors increases the likelihood of supply chain compromise, affecting a wide range of victims including enterprises relying on open-source tools and AI-assisted development environments. Persistence mechanisms enable long-term access, increasing the risk of espionage and data exfiltration. The campaign’s ability to impersonate legitimate tools and use social engineering tactics complicates detection and response efforts. Although no known exploits are reported in the wild yet, the evolving tactics suggest a growing threat that could impact software supply chains and developer ecosystems globally. Organizations may face reputational damage, operational disruption, and financial losses if infected systems are used as launch points for broader attacks.
Mitigation Recommendations
Organizations should implement strict code and dependency vetting processes, especially for software sourced from GitHub and AI-assisted development tools. Employ endpoint detection and response (EDR) solutions capable of monitoring for suspicious shell command executions, fake authentication prompts, and persistence mechanisms typical of macOS malware. Enforce the principle of least privilege to limit the impact of credential theft and restrict the ability to execute unauthorized scripts or install software. Regularly audit and monitor GitHub repositories and AI workflow configurations for unauthorized or suspicious changes. Use multi-factor authentication (MFA) to reduce the risk of credential misuse. Educate developers and users about the risks of following unverified installation instructions and the dangers of executing unknown scripts. Implement network segmentation and monitor outbound traffic for connections to known malicious domains such as trackpipe.dev. Employ threat intelligence feeds to update detection rules with identified file hashes and indicators of compromise. Finally, maintain up-to-date backups and incident response plans tailored to macOS environments to enable rapid recovery in case of infection.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, China
Indicators of Compromise
- hash: 189b8419863830f2732324a0e02e71721ec550ffa606f9dc719f935db5d25821
- hash: 3ab0bcc8ff821bd6ba0e5fdbb992836922a67524f8284d69324f61e651981040
- hash: 3c2fa99741e71436eb7f52fcf382bb92425104bd63f82d0bd0111caf2c8b91b4
- hash: 43dc96bde2d5214ea3e93c1d9f62da54c260587e0b5bd366bb55ab615262384e
- hash: 593aa8051b146e7b1effd90708210ccac3527076e2b5b5068216553a5557396d
- hash: 72bc4f82786e23f067d8731dac2b51c033f49ceceab0a64065a160cdff54f488
- hash: 8da42291c7c8ad4d7b174367c7b59e6cf57804f659490947957212d16dfcfe16
- hash: 946206d42497ea54a4df3f3fed262a99632672e99b02abcc7a9aff0f677efba8
- hash: a80f2f5ba53bd19c35af5eed763fbaf9f00487bb4df0997651af861ef157ccea
- hash: ad23c83bbcd2e2ed7ba3338b723f3a36ef7a6866672395a04fdb8fbd1bf68a90
- hash: b04cdafdaa9220ab819f33790f014fd84a10f3908e3d7e97a652fa0d76f40c2f
- hash: baaa13491ddaba1fc8eb5a3e7848fb1e33f6f1f5b19b5efb0d433ab09e38a1f0
- hash: df8bc4bf6f312a914fa82e56dab59ceb0b2066830696ea7457067f7d446518eb
- hash: e3ee5909f908b489a93702709fae038f0b3c864b155013a9ad7d590f1eec7fe4
- hash: ec8d3b922db1cf3a82141a53a472538d10563860dfb93259e99d0aec3661734c
- hash: ee968f51f1b2c0d9fcdacfd6aa9ef24cc6212118464093e67f1fdaa1144e15b1
- domain: trackpipe.dev
GhostClaw expands beyond npm: GitHub repositories and AI workflows deliver macOS infostealer
Description
The GhostClaw malware campaign has expanded its distribution methods beyond npm packages to include GitHub repositories and AI-assisted development workflows. The attackers impersonate legitimate tools and utilize multi-stage payloads to steal credentials and retrieve additional malicious code. The infection chain involves executing shell commands, presenting fake authentication prompts, and establishing persistence. The campaign leverages both manual installation through README instructions and automated AI-assisted workflows. Multiple GitHub repositories have been identified, all communicating with a common command-and-control infrastructure. This shift in tactics allows the attackers to target a broader range of victims, including developers and users of AI-assisted coding tools.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
GhostClaw is a macOS infostealer malware campaign that has recently expanded its distribution vectors beyond npm packages to include GitHub repositories and AI-assisted development workflows. The attackers behind GhostClaw impersonate legitimate developer tools and repositories to trick victims into executing multi-stage payloads. The infection chain typically involves executing shell commands to download and run malicious components, presenting fake authentication dialogs to harvest credentials, and establishing persistence mechanisms to maintain long-term access. The campaign leverages both manual installation via README instructions and automated AI-assisted workflows, increasing the likelihood of infection among developers and users of AI coding tools. Multiple GitHub repositories have been identified as distribution points, all linking back to a common command-and-control (C2) infrastructure, enabling remote control and additional payload delivery. The malware employs obfuscation and evasion techniques such as masquerading as legitimate software, multi-stage payloads, and persistence via system modifications. While no CVEs or known exploits have been reported, the campaign represents a sophisticated supply chain attack targeting macOS environments. The use of AI-assisted workflows as a distribution vector is a novel tactic that broadens the attack surface and complicates detection. Indicators of compromise include specific file hashes and the domain trackpipe.dev used for C2 communications. The campaign’s tactics align with MITRE ATT&CK techniques such as T1204.002 (User Execution), T1036 (Masquerading), T1064 (Scripting), T1528 (Steal Credentials), T1547.001 (Persistence via Launch Agents), T1056.002 (Credential API Hooking), T1059.004 (Command and Scripting Interpreter: AppleScript), T1027 (Obfuscated Files or Information), T1102.002 (Web Service), and T1105 (Ingress Tool Transfer).
Potential Impact
This threat poses significant risks to organizations and individual developers using macOS systems, especially those involved in software development and AI-assisted coding workflows. Credential theft can lead to unauthorized access to sensitive systems, source code repositories, and internal networks, potentially resulting in intellectual property theft, data breaches, and further malware deployment. The use of GitHub repositories and AI workflows as infection vectors increases the likelihood of supply chain compromise, affecting a wide range of victims including enterprises relying on open-source tools and AI-assisted development environments. Persistence mechanisms enable long-term access, increasing the risk of espionage and data exfiltration. The campaign’s ability to impersonate legitimate tools and use social engineering tactics complicates detection and response efforts. Although no known exploits are reported in the wild yet, the evolving tactics suggest a growing threat that could impact software supply chains and developer ecosystems globally. Organizations may face reputational damage, operational disruption, and financial losses if infected systems are used as launch points for broader attacks.
Mitigation Recommendations
Organizations should implement strict code and dependency vetting processes, especially for software sourced from GitHub and AI-assisted development tools. Employ endpoint detection and response (EDR) solutions capable of monitoring for suspicious shell command executions, fake authentication prompts, and persistence mechanisms typical of macOS malware. Enforce the principle of least privilege to limit the impact of credential theft and restrict the ability to execute unauthorized scripts or install software. Regularly audit and monitor GitHub repositories and AI workflow configurations for unauthorized or suspicious changes. Use multi-factor authentication (MFA) to reduce the risk of credential misuse. Educate developers and users about the risks of following unverified installation instructions and the dangers of executing unknown scripts. Implement network segmentation and monitor outbound traffic for connections to known malicious domains such as trackpipe.dev. Employ threat intelligence feeds to update detection rules with identified file hashes and indicators of compromise. Finally, maintain up-to-date backups and incident response plans tailored to macOS environments to enable rapid recovery in case of infection.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.jamf.com/blog/ghostclaw-ghostloader-malware-github-repositories-ai-workflows/"]
- Adversary
- GhostClaw
- Pulse Id
- 69c10792a24c3b8eec93ad9c
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash189b8419863830f2732324a0e02e71721ec550ffa606f9dc719f935db5d25821 | — | |
hash3ab0bcc8ff821bd6ba0e5fdbb992836922a67524f8284d69324f61e651981040 | — | |
hash3c2fa99741e71436eb7f52fcf382bb92425104bd63f82d0bd0111caf2c8b91b4 | — | |
hash43dc96bde2d5214ea3e93c1d9f62da54c260587e0b5bd366bb55ab615262384e | — | |
hash593aa8051b146e7b1effd90708210ccac3527076e2b5b5068216553a5557396d | — | |
hash72bc4f82786e23f067d8731dac2b51c033f49ceceab0a64065a160cdff54f488 | — | |
hash8da42291c7c8ad4d7b174367c7b59e6cf57804f659490947957212d16dfcfe16 | — | |
hash946206d42497ea54a4df3f3fed262a99632672e99b02abcc7a9aff0f677efba8 | — | |
hasha80f2f5ba53bd19c35af5eed763fbaf9f00487bb4df0997651af861ef157ccea | — | |
hashad23c83bbcd2e2ed7ba3338b723f3a36ef7a6866672395a04fdb8fbd1bf68a90 | — | |
hashb04cdafdaa9220ab819f33790f014fd84a10f3908e3d7e97a652fa0d76f40c2f | — | |
hashbaaa13491ddaba1fc8eb5a3e7848fb1e33f6f1f5b19b5efb0d433ab09e38a1f0 | — | |
hashdf8bc4bf6f312a914fa82e56dab59ceb0b2066830696ea7457067f7d446518eb | — | |
hashe3ee5909f908b489a93702709fae038f0b3c864b155013a9ad7d590f1eec7fe4 | — | |
hashec8d3b922db1cf3a82141a53a472538d10563860dfb93259e99d0aec3661734c | — | |
hashee968f51f1b2c0d9fcdacfd6aa9ef24cc6212118464093e67f1fdaa1144e15b1 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaintrackpipe.dev | — |
Threat ID: 69c10bcff4197a8e3b33b87d
Added to database: 3/23/2026, 9:45:51 AM
Last enriched: 3/23/2026, 10:01:19 AM
Last updated: 3/24/2026, 5:39:26 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.