Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer

0
Medium
Published: Mon Feb 23 2026 (02/23/2026, 22:38:38 UTC)
Source: AlienVault OTX General

Description

A new campaign exploits OpenClaw skills to distribute the Atomic MacOS Stealer (AMOS). This evolution in supply chain attacks manipulates AI agentic workflows to install malware. The campaign spans multiple repositories with hundreds of malicious skills uploaded to ClawHub and SkillsMP. The infection chain begins with a seemingly harmless SKILL.md file that installs a prerequisite, leading to the download of a Mach-O universal binary. This AMOS variant steals extensive data, including credentials, browser data, cryptocurrency wallets, and various user documents. It lacks system persistence but expands its reach by exfiltrating Apple and KeePass keychains. The malware uses sophisticated encryption schemes and targets multiple browsers and cryptocurrency wallets.

AI-Powered Analysis

AILast updated: 02/24/2026, 09:16:30 UTC

Technical Analysis

This threat involves a sophisticated supply chain attack campaign that abuses OpenClaw skills—modular AI agent workflows—to distribute the Atomic MacOS Stealer (AMOS) malware. Attackers upload hundreds of malicious skills to popular AI skill repositories such as ClawHub and SkillsMP. The infection chain begins with a SKILL.md file that appears harmless but installs a prerequisite component, which then downloads a Mach-O universal binary executable tailored for macOS. AMOS is designed to steal a broad spectrum of sensitive information: user credentials, browser data, cryptocurrency wallets, Apple keychains, KeePass keychains, and various user documents. The malware employs sophisticated encryption to protect its exfiltrated data and targets multiple browsers and wallet applications to maximize impact. Notably, AMOS does not establish persistence on infected systems, which may limit long-term control but does not reduce the immediate risk of data theft. The campaign represents an evolution in supply chain attacks by manipulating AI agentic workflows, highlighting the emerging risk of AI skill repositories as attack vectors. While there are no known exploits in the wild yet, the widespread distribution of malicious skills across repositories poses a significant risk to macOS users and organizations leveraging AI automation tools.

Potential Impact

The primary impact of this threat is the extensive theft of sensitive data from macOS systems, including credentials, browser histories, cryptocurrency wallets, and keychain data. This can lead to identity theft, financial loss, unauthorized access to corporate and personal accounts, and exposure of confidential documents. The lack of persistence means attackers may not maintain long-term access, but the immediate data exfiltration can cause severe damage. Organizations relying on macOS devices, especially those using AI skill repositories or agentic AI workflows, face increased risk of supply chain compromise. The campaign’s use of AI skill repositories as a distribution vector introduces a novel attack surface, potentially affecting software supply chain trust and AI automation security. The medium severity rating reflects the significant data loss potential balanced against the absence of persistence and no current widespread exploitation. However, the campaign’s scale and sophistication suggest that targeted organizations could suffer impactful breaches if defenses are not enhanced.

Mitigation Recommendations

1. Implement strict vetting and validation processes for AI skills and modules sourced from public repositories like ClawHub and SkillsMP, including code reviews and behavioral analysis before deployment. 2. Employ endpoint detection and response (EDR) solutions capable of detecting unusual Mach-O binary executions and suspicious network exfiltration activities on macOS systems. 3. Enforce the principle of least privilege for AI agents and workflows to limit their ability to download and execute arbitrary binaries. 4. Monitor and restrict access to sensitive data stores such as Apple keychains and KeePass databases, using encryption and access controls. 5. Educate users and administrators about the risks of installing unverified AI skills and the importance of verifying sources. 6. Use network segmentation and data loss prevention (DLP) tools to detect and block unauthorized data exfiltration attempts. 7. Regularly update macOS and security tools to incorporate the latest threat intelligence and detection capabilities. 8. Establish incident response plans specifically addressing supply chain and AI-related threats to enable rapid containment and remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.trendmicro.com/en_us/research/26/b/openclaw-skills-used-to-distribute-atomic-macos-stealer.html"]
Adversary
null
Pulse Id
699cd6ee7d755d4afd290651
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip91.92.242.30

Hash

ValueDescriptionCopy
hash0c76e33ddde228e9ce098edf3bf5f06a
hash760c89959e2d80f9b78a320023a875b7
hash80ab5ba94b8b4d135453f8cb58be209d
hash8611dfd731c27ac1592de60a31c66634
hasha37f6403fbf28fa0b48863287f4c5a5d
hasha6d19622c8961b781901baec4ab599de
hasha8ad1697e8c8823ac7b77557bcb85a24
hashb488d8d0cb6ee18af9e5800b66ff1ed9
hashb8f295977d4dec2e9bffd6fce2320bd1
hashd8ba368e60477651ffb04e8e4f93509b
hash125c5ca2b836cb46533cf690563528b8bd83a50f
hash46a203240b7b06ec66058de2ab459d24c3545993
hash71f101a613cc57745d4a605d0ce6d3c1cd7a4229
hash8a5a5ff3663c4a530cfe975e66a0257f308368c6
hash92a3d22717e6a7d25f74759dc9ec6f72e60c4f17
hash93b3d3925ccc201ab0f16017153a79ef05b8f5c2
hasha396ec79d8e33ca984c7ffc7ee4d7d2caa8412ee
hashac39f9b861a2c5829a4a841a0277763aa7acd84c
hashc32d9638bc5c1249afc0ba5eac6ed5cc712b9df9
hashf0ec6c8ac195ba88ef7f4e415d977a14d00acca2
hash0e52566ccff4830e30ef45d2ad804eefba4ffe42062919398bf1334aab74dd65
hash1e6d4b0538558429422b71d1f4d724c8ce31be92d299df33a8339e32316e2298
hash233a98cb2c5536dabda0944eb2de8d47ad5ce9371a164fe2a8c29d8c55bc240c
hash30f97ae88f8861eeadeb54854d47078724e52e2ef36dd847180663b7f5763168
hash45d8e56bd86960727bcaa4b5c9f7c3422a22723c23ea5b46b6aa9bc42ed1f9f1
hash5968bd7d3a27a6a17ea73be6ee4b00807e83a786fdfa73cc5d8dbf262426c12c
hash5adb10e107d5075abf485f52a387fb419d06ad84d0df38e75769783f16862273
hash5e4696a2cfdc3336b1ecbc17c1642f6bf7d9a34497161659414dae33fe6225d7
hash95fb8f28d08e19090443bda8bd71bbb79f7c451288a2de6f1ca0ad6fee8b4569
hash998c38b430097479b015a68d9435dc5b98684119739572a4dff11e085881187e
hasha0e66f3067e4aaf5b83e45b7845cc43b2fc96032a4398cab7cc9d11f4f962e91
hashca96fe6259d602a22951d5d3e244e1b752bf0d20086f445bf7015c8798e7b95b
hashd781d5cabaf5f305bbb8afcd9a54d7ba616bfa7aef5c4d16f6bce3d2bf3b4073
hashec2920e56f2f62c6a2ed1242747980f6f7343c2404b7ae9a6e975b66b1c24b6d
hashf0a54f2b44e557854b0a5001c4e10185884af945814786f78b86539014f78a16
hashf2cb9de40cb8b7e13e7d2b0b3e426f8503781a35d8bba3715395430e9b5eeb38

Url

ValueDescriptionCopy
urlhttp://91.92.242.30/1v07y9e1m6v7thl6
urlhttp://91.92.242.30/6wioz8285kcbax6v
urlhttp://91.92.242.30/6x8c0trkp4l9uugo
urlhttp://91.92.242.30/dx2w5j5bka6qkwxi
urlhttp://91.92.242.30/dyrtvwjfveyxjf23
urlhttp://91.92.242.30/ece0f208u7uqhs6x
urlhttp://91.92.242.30/il24xgriequcys45
urlhttp://91.92.242.30/l5ou8r739pc48rwi
urlhttp://91.92.242.30/lamq4uerkruo6ssm
urlhttp://91.92.242.30/q0c7ew2ro8l2cfqp
urlhttps://socifiapp.com/api/reports/upload
urlhttps://install.app-distribution.net/setup/

Domain

ValueDescriptionCopy
domainsocifiapp.com
domaininstall.app-distribution.net

Threat ID: 699d68e0be58cf853b9798e7

Added to database: 2/24/2026, 9:01:20 AM

Last enriched: 2/24/2026, 9:16:30 AM

Last updated: 2/24/2026, 9:23:36 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats