Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

GhostClaw expands beyond npm: GitHub repositories and AI workflows deliver macOS infostealer

0
Medium
Published: Mon Mar 23 2026 (03/23/2026, 09:27:46 UTC)
Source: AlienVault OTX General

Description

The GhostClaw malware campaign has expanded its distribution methods beyond npm packages to include GitHub repositories and AI-assisted development workflows. The attackers impersonate legitimate tools and utilize multi-stage payloads to steal credentials and retrieve additional malicious code. The infection chain involves executing shell commands, presenting fake authentication prompts, and establishing persistence. The campaign leverages both manual installation through README instructions and automated AI-assisted workflows. Multiple GitHub repositories have been identified, all communicating with a common command-and-control infrastructure. This shift in tactics allows the attackers to target a broader range of victims, including developers and users of AI-assisted coding tools.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 10:01:19 UTC

Technical Analysis

GhostClaw is a macOS infostealer malware campaign that has recently expanded its distribution vectors beyond npm packages to include GitHub repositories and AI-assisted development workflows. The attackers behind GhostClaw impersonate legitimate developer tools and repositories to trick victims into executing multi-stage payloads. The infection chain typically involves executing shell commands to download and run malicious components, presenting fake authentication dialogs to harvest credentials, and establishing persistence mechanisms to maintain long-term access. The campaign leverages both manual installation via README instructions and automated AI-assisted workflows, increasing the likelihood of infection among developers and users of AI coding tools. Multiple GitHub repositories have been identified as distribution points, all linking back to a common command-and-control (C2) infrastructure, enabling remote control and additional payload delivery. The malware employs obfuscation and evasion techniques such as masquerading as legitimate software, multi-stage payloads, and persistence via system modifications. While no CVEs or known exploits have been reported, the campaign represents a sophisticated supply chain attack targeting macOS environments. The use of AI-assisted workflows as a distribution vector is a novel tactic that broadens the attack surface and complicates detection. Indicators of compromise include specific file hashes and the domain trackpipe.dev used for C2 communications. The campaign’s tactics align with MITRE ATT&CK techniques such as T1204.002 (User Execution), T1036 (Masquerading), T1064 (Scripting), T1528 (Steal Credentials), T1547.001 (Persistence via Launch Agents), T1056.002 (Credential API Hooking), T1059.004 (Command and Scripting Interpreter: AppleScript), T1027 (Obfuscated Files or Information), T1102.002 (Web Service), and T1105 (Ingress Tool Transfer).

Potential Impact

This threat poses significant risks to organizations and individual developers using macOS systems, especially those involved in software development and AI-assisted coding workflows. Credential theft can lead to unauthorized access to sensitive systems, source code repositories, and internal networks, potentially resulting in intellectual property theft, data breaches, and further malware deployment. The use of GitHub repositories and AI workflows as infection vectors increases the likelihood of supply chain compromise, affecting a wide range of victims including enterprises relying on open-source tools and AI-assisted development environments. Persistence mechanisms enable long-term access, increasing the risk of espionage and data exfiltration. The campaign’s ability to impersonate legitimate tools and use social engineering tactics complicates detection and response efforts. Although no known exploits are reported in the wild yet, the evolving tactics suggest a growing threat that could impact software supply chains and developer ecosystems globally. Organizations may face reputational damage, operational disruption, and financial losses if infected systems are used as launch points for broader attacks.

Mitigation Recommendations

Organizations should implement strict code and dependency vetting processes, especially for software sourced from GitHub and AI-assisted development tools. Employ endpoint detection and response (EDR) solutions capable of monitoring for suspicious shell command executions, fake authentication prompts, and persistence mechanisms typical of macOS malware. Enforce the principle of least privilege to limit the impact of credential theft and restrict the ability to execute unauthorized scripts or install software. Regularly audit and monitor GitHub repositories and AI workflow configurations for unauthorized or suspicious changes. Use multi-factor authentication (MFA) to reduce the risk of credential misuse. Educate developers and users about the risks of following unverified installation instructions and the dangers of executing unknown scripts. Implement network segmentation and monitor outbound traffic for connections to known malicious domains such as trackpipe.dev. Employ threat intelligence feeds to update detection rules with identified file hashes and indicators of compromise. Finally, maintain up-to-date backups and incident response plans tailored to macOS environments to enable rapid recovery in case of infection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.jamf.com/blog/ghostclaw-ghostloader-malware-github-repositories-ai-workflows/"]
Adversary
GhostClaw
Pulse Id
69c10792a24c3b8eec93ad9c
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash189b8419863830f2732324a0e02e71721ec550ffa606f9dc719f935db5d25821
hash3ab0bcc8ff821bd6ba0e5fdbb992836922a67524f8284d69324f61e651981040
hash3c2fa99741e71436eb7f52fcf382bb92425104bd63f82d0bd0111caf2c8b91b4
hash43dc96bde2d5214ea3e93c1d9f62da54c260587e0b5bd366bb55ab615262384e
hash593aa8051b146e7b1effd90708210ccac3527076e2b5b5068216553a5557396d
hash72bc4f82786e23f067d8731dac2b51c033f49ceceab0a64065a160cdff54f488
hash8da42291c7c8ad4d7b174367c7b59e6cf57804f659490947957212d16dfcfe16
hash946206d42497ea54a4df3f3fed262a99632672e99b02abcc7a9aff0f677efba8
hasha80f2f5ba53bd19c35af5eed763fbaf9f00487bb4df0997651af861ef157ccea
hashad23c83bbcd2e2ed7ba3338b723f3a36ef7a6866672395a04fdb8fbd1bf68a90
hashb04cdafdaa9220ab819f33790f014fd84a10f3908e3d7e97a652fa0d76f40c2f
hashbaaa13491ddaba1fc8eb5a3e7848fb1e33f6f1f5b19b5efb0d433ab09e38a1f0
hashdf8bc4bf6f312a914fa82e56dab59ceb0b2066830696ea7457067f7d446518eb
hashe3ee5909f908b489a93702709fae038f0b3c864b155013a9ad7d590f1eec7fe4
hashec8d3b922db1cf3a82141a53a472538d10563860dfb93259e99d0aec3661734c
hashee968f51f1b2c0d9fcdacfd6aa9ef24cc6212118464093e67f1fdaa1144e15b1

Domain

ValueDescriptionCopy
domaintrackpipe.dev

Threat ID: 69c10bcff4197a8e3b33b87d

Added to database: 3/23/2026, 9:45:51 AM

Last enriched: 3/23/2026, 10:01:19 AM

Last updated: 3/24/2026, 5:39:26 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses