Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
A new campaign exploits OpenClaw skills to distribute the Atomic MacOS Stealer (AMOS). This evolution in supply chain attacks manipulates AI agentic workflows to install malware. The campaign spans multiple repositories with hundreds of malicious skills uploaded to ClawHub and SkillsMP. The infection chain begins with a seemingly harmless SKILL.md file that installs a prerequisite, leading to the download of a Mach-O universal binary. This AMOS variant steals extensive data, including credentials, browser data, cryptocurrency wallets, and various user documents. It lacks system persistence but expands its reach by exfiltrating Apple and KeePass keychains. The malware uses sophisticated encryption schemes and targets multiple browsers and cryptocurrency wallets.
AI Analysis
Technical Summary
This threat involves a sophisticated supply chain attack campaign that abuses OpenClaw skills—modular AI agent workflows—to distribute the Atomic MacOS Stealer (AMOS) malware. Attackers upload hundreds of malicious skills to popular AI skill repositories such as ClawHub and SkillsMP. The infection chain begins with a SKILL.md file that appears harmless but installs a prerequisite component, which then downloads a Mach-O universal binary executable tailored for macOS. AMOS is designed to steal a broad spectrum of sensitive information: user credentials, browser data, cryptocurrency wallets, Apple keychains, KeePass keychains, and various user documents. The malware employs sophisticated encryption to protect its exfiltrated data and targets multiple browsers and wallet applications to maximize impact. Notably, AMOS does not establish persistence on infected systems, which may limit long-term control but does not reduce the immediate risk of data theft. The campaign represents an evolution in supply chain attacks by manipulating AI agentic workflows, highlighting the emerging risk of AI skill repositories as attack vectors. While there are no known exploits in the wild yet, the widespread distribution of malicious skills across repositories poses a significant risk to macOS users and organizations leveraging AI automation tools.
Potential Impact
The primary impact of this threat is the extensive theft of sensitive data from macOS systems, including credentials, browser histories, cryptocurrency wallets, and keychain data. This can lead to identity theft, financial loss, unauthorized access to corporate and personal accounts, and exposure of confidential documents. The lack of persistence means attackers may not maintain long-term access, but the immediate data exfiltration can cause severe damage. Organizations relying on macOS devices, especially those using AI skill repositories or agentic AI workflows, face increased risk of supply chain compromise. The campaign’s use of AI skill repositories as a distribution vector introduces a novel attack surface, potentially affecting software supply chain trust and AI automation security. The medium severity rating reflects the significant data loss potential balanced against the absence of persistence and no current widespread exploitation. However, the campaign’s scale and sophistication suggest that targeted organizations could suffer impactful breaches if defenses are not enhanced.
Mitigation Recommendations
1. Implement strict vetting and validation processes for AI skills and modules sourced from public repositories like ClawHub and SkillsMP, including code reviews and behavioral analysis before deployment. 2. Employ endpoint detection and response (EDR) solutions capable of detecting unusual Mach-O binary executions and suspicious network exfiltration activities on macOS systems. 3. Enforce the principle of least privilege for AI agents and workflows to limit their ability to download and execute arbitrary binaries. 4. Monitor and restrict access to sensitive data stores such as Apple keychains and KeePass databases, using encryption and access controls. 5. Educate users and administrators about the risks of installing unverified AI skills and the importance of verifying sources. 6. Use network segmentation and data loss prevention (DLP) tools to detect and block unauthorized data exfiltration attempts. 7. Regularly update macOS and security tools to incorporate the latest threat intelligence and detection capabilities. 8. Establish incident response plans specifically addressing supply chain and AI-related threats to enable rapid containment and remediation.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, Singapore
Indicators of Compromise
- ip: 91.92.242.30
- hash: 0c76e33ddde228e9ce098edf3bf5f06a
- hash: 760c89959e2d80f9b78a320023a875b7
- hash: 80ab5ba94b8b4d135453f8cb58be209d
- hash: 8611dfd731c27ac1592de60a31c66634
- hash: a37f6403fbf28fa0b48863287f4c5a5d
- hash: a6d19622c8961b781901baec4ab599de
- hash: a8ad1697e8c8823ac7b77557bcb85a24
- hash: b488d8d0cb6ee18af9e5800b66ff1ed9
- hash: b8f295977d4dec2e9bffd6fce2320bd1
- hash: d8ba368e60477651ffb04e8e4f93509b
- hash: 125c5ca2b836cb46533cf690563528b8bd83a50f
- hash: 46a203240b7b06ec66058de2ab459d24c3545993
- hash: 71f101a613cc57745d4a605d0ce6d3c1cd7a4229
- hash: 8a5a5ff3663c4a530cfe975e66a0257f308368c6
- hash: 92a3d22717e6a7d25f74759dc9ec6f72e60c4f17
- hash: 93b3d3925ccc201ab0f16017153a79ef05b8f5c2
- hash: a396ec79d8e33ca984c7ffc7ee4d7d2caa8412ee
- hash: ac39f9b861a2c5829a4a841a0277763aa7acd84c
- hash: c32d9638bc5c1249afc0ba5eac6ed5cc712b9df9
- hash: f0ec6c8ac195ba88ef7f4e415d977a14d00acca2
- hash: 0e52566ccff4830e30ef45d2ad804eefba4ffe42062919398bf1334aab74dd65
- hash: 1e6d4b0538558429422b71d1f4d724c8ce31be92d299df33a8339e32316e2298
- hash: 233a98cb2c5536dabda0944eb2de8d47ad5ce9371a164fe2a8c29d8c55bc240c
- hash: 30f97ae88f8861eeadeb54854d47078724e52e2ef36dd847180663b7f5763168
- hash: 45d8e56bd86960727bcaa4b5c9f7c3422a22723c23ea5b46b6aa9bc42ed1f9f1
- hash: 5968bd7d3a27a6a17ea73be6ee4b00807e83a786fdfa73cc5d8dbf262426c12c
- hash: 5adb10e107d5075abf485f52a387fb419d06ad84d0df38e75769783f16862273
- hash: 5e4696a2cfdc3336b1ecbc17c1642f6bf7d9a34497161659414dae33fe6225d7
- hash: 95fb8f28d08e19090443bda8bd71bbb79f7c451288a2de6f1ca0ad6fee8b4569
- hash: 998c38b430097479b015a68d9435dc5b98684119739572a4dff11e085881187e
- hash: a0e66f3067e4aaf5b83e45b7845cc43b2fc96032a4398cab7cc9d11f4f962e91
- hash: ca96fe6259d602a22951d5d3e244e1b752bf0d20086f445bf7015c8798e7b95b
- hash: d781d5cabaf5f305bbb8afcd9a54d7ba616bfa7aef5c4d16f6bce3d2bf3b4073
- hash: ec2920e56f2f62c6a2ed1242747980f6f7343c2404b7ae9a6e975b66b1c24b6d
- hash: f0a54f2b44e557854b0a5001c4e10185884af945814786f78b86539014f78a16
- hash: f2cb9de40cb8b7e13e7d2b0b3e426f8503781a35d8bba3715395430e9b5eeb38
- url: http://91.92.242.30/1v07y9e1m6v7thl6
- url: http://91.92.242.30/6wioz8285kcbax6v
- url: http://91.92.242.30/6x8c0trkp4l9uugo
- url: http://91.92.242.30/dx2w5j5bka6qkwxi
- url: http://91.92.242.30/dyrtvwjfveyxjf23
- url: http://91.92.242.30/ece0f208u7uqhs6x
- url: http://91.92.242.30/il24xgriequcys45
- url: http://91.92.242.30/l5ou8r739pc48rwi
- url: http://91.92.242.30/lamq4uerkruo6ssm
- url: http://91.92.242.30/q0c7ew2ro8l2cfqp
- url: https://socifiapp.com/api/reports/upload
- domain: socifiapp.com
- url: https://install.app-distribution.net/setup/
- domain: install.app-distribution.net
Malicious OpenClaw Skills Used to Distribute Atomic MacOS Stealer
Description
A new campaign exploits OpenClaw skills to distribute the Atomic MacOS Stealer (AMOS). This evolution in supply chain attacks manipulates AI agentic workflows to install malware. The campaign spans multiple repositories with hundreds of malicious skills uploaded to ClawHub and SkillsMP. The infection chain begins with a seemingly harmless SKILL.md file that installs a prerequisite, leading to the download of a Mach-O universal binary. This AMOS variant steals extensive data, including credentials, browser data, cryptocurrency wallets, and various user documents. It lacks system persistence but expands its reach by exfiltrating Apple and KeePass keychains. The malware uses sophisticated encryption schemes and targets multiple browsers and cryptocurrency wallets.
AI-Powered Analysis
Technical Analysis
This threat involves a sophisticated supply chain attack campaign that abuses OpenClaw skills—modular AI agent workflows—to distribute the Atomic MacOS Stealer (AMOS) malware. Attackers upload hundreds of malicious skills to popular AI skill repositories such as ClawHub and SkillsMP. The infection chain begins with a SKILL.md file that appears harmless but installs a prerequisite component, which then downloads a Mach-O universal binary executable tailored for macOS. AMOS is designed to steal a broad spectrum of sensitive information: user credentials, browser data, cryptocurrency wallets, Apple keychains, KeePass keychains, and various user documents. The malware employs sophisticated encryption to protect its exfiltrated data and targets multiple browsers and wallet applications to maximize impact. Notably, AMOS does not establish persistence on infected systems, which may limit long-term control but does not reduce the immediate risk of data theft. The campaign represents an evolution in supply chain attacks by manipulating AI agentic workflows, highlighting the emerging risk of AI skill repositories as attack vectors. While there are no known exploits in the wild yet, the widespread distribution of malicious skills across repositories poses a significant risk to macOS users and organizations leveraging AI automation tools.
Potential Impact
The primary impact of this threat is the extensive theft of sensitive data from macOS systems, including credentials, browser histories, cryptocurrency wallets, and keychain data. This can lead to identity theft, financial loss, unauthorized access to corporate and personal accounts, and exposure of confidential documents. The lack of persistence means attackers may not maintain long-term access, but the immediate data exfiltration can cause severe damage. Organizations relying on macOS devices, especially those using AI skill repositories or agentic AI workflows, face increased risk of supply chain compromise. The campaign’s use of AI skill repositories as a distribution vector introduces a novel attack surface, potentially affecting software supply chain trust and AI automation security. The medium severity rating reflects the significant data loss potential balanced against the absence of persistence and no current widespread exploitation. However, the campaign’s scale and sophistication suggest that targeted organizations could suffer impactful breaches if defenses are not enhanced.
Mitigation Recommendations
1. Implement strict vetting and validation processes for AI skills and modules sourced from public repositories like ClawHub and SkillsMP, including code reviews and behavioral analysis before deployment. 2. Employ endpoint detection and response (EDR) solutions capable of detecting unusual Mach-O binary executions and suspicious network exfiltration activities on macOS systems. 3. Enforce the principle of least privilege for AI agents and workflows to limit their ability to download and execute arbitrary binaries. 4. Monitor and restrict access to sensitive data stores such as Apple keychains and KeePass databases, using encryption and access controls. 5. Educate users and administrators about the risks of installing unverified AI skills and the importance of verifying sources. 6. Use network segmentation and data loss prevention (DLP) tools to detect and block unauthorized data exfiltration attempts. 7. Regularly update macOS and security tools to incorporate the latest threat intelligence and detection capabilities. 8. Establish incident response plans specifically addressing supply chain and AI-related threats to enable rapid containment and remediation.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.trendmicro.com/en_us/research/26/b/openclaw-skills-used-to-distribute-atomic-macos-stealer.html"]
- Adversary
- null
- Pulse Id
- 699cd6ee7d755d4afd290651
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip91.92.242.30 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash0c76e33ddde228e9ce098edf3bf5f06a | — | |
hash760c89959e2d80f9b78a320023a875b7 | — | |
hash80ab5ba94b8b4d135453f8cb58be209d | — | |
hash8611dfd731c27ac1592de60a31c66634 | — | |
hasha37f6403fbf28fa0b48863287f4c5a5d | — | |
hasha6d19622c8961b781901baec4ab599de | — | |
hasha8ad1697e8c8823ac7b77557bcb85a24 | — | |
hashb488d8d0cb6ee18af9e5800b66ff1ed9 | — | |
hashb8f295977d4dec2e9bffd6fce2320bd1 | — | |
hashd8ba368e60477651ffb04e8e4f93509b | — | |
hash125c5ca2b836cb46533cf690563528b8bd83a50f | — | |
hash46a203240b7b06ec66058de2ab459d24c3545993 | — | |
hash71f101a613cc57745d4a605d0ce6d3c1cd7a4229 | — | |
hash8a5a5ff3663c4a530cfe975e66a0257f308368c6 | — | |
hash92a3d22717e6a7d25f74759dc9ec6f72e60c4f17 | — | |
hash93b3d3925ccc201ab0f16017153a79ef05b8f5c2 | — | |
hasha396ec79d8e33ca984c7ffc7ee4d7d2caa8412ee | — | |
hashac39f9b861a2c5829a4a841a0277763aa7acd84c | — | |
hashc32d9638bc5c1249afc0ba5eac6ed5cc712b9df9 | — | |
hashf0ec6c8ac195ba88ef7f4e415d977a14d00acca2 | — | |
hash0e52566ccff4830e30ef45d2ad804eefba4ffe42062919398bf1334aab74dd65 | — | |
hash1e6d4b0538558429422b71d1f4d724c8ce31be92d299df33a8339e32316e2298 | — | |
hash233a98cb2c5536dabda0944eb2de8d47ad5ce9371a164fe2a8c29d8c55bc240c | — | |
hash30f97ae88f8861eeadeb54854d47078724e52e2ef36dd847180663b7f5763168 | — | |
hash45d8e56bd86960727bcaa4b5c9f7c3422a22723c23ea5b46b6aa9bc42ed1f9f1 | — | |
hash5968bd7d3a27a6a17ea73be6ee4b00807e83a786fdfa73cc5d8dbf262426c12c | — | |
hash5adb10e107d5075abf485f52a387fb419d06ad84d0df38e75769783f16862273 | — | |
hash5e4696a2cfdc3336b1ecbc17c1642f6bf7d9a34497161659414dae33fe6225d7 | — | |
hash95fb8f28d08e19090443bda8bd71bbb79f7c451288a2de6f1ca0ad6fee8b4569 | — | |
hash998c38b430097479b015a68d9435dc5b98684119739572a4dff11e085881187e | — | |
hasha0e66f3067e4aaf5b83e45b7845cc43b2fc96032a4398cab7cc9d11f4f962e91 | — | |
hashca96fe6259d602a22951d5d3e244e1b752bf0d20086f445bf7015c8798e7b95b | — | |
hashd781d5cabaf5f305bbb8afcd9a54d7ba616bfa7aef5c4d16f6bce3d2bf3b4073 | — | |
hashec2920e56f2f62c6a2ed1242747980f6f7343c2404b7ae9a6e975b66b1c24b6d | — | |
hashf0a54f2b44e557854b0a5001c4e10185884af945814786f78b86539014f78a16 | — | |
hashf2cb9de40cb8b7e13e7d2b0b3e426f8503781a35d8bba3715395430e9b5eeb38 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://91.92.242.30/1v07y9e1m6v7thl6 | — | |
urlhttp://91.92.242.30/6wioz8285kcbax6v | — | |
urlhttp://91.92.242.30/6x8c0trkp4l9uugo | — | |
urlhttp://91.92.242.30/dx2w5j5bka6qkwxi | — | |
urlhttp://91.92.242.30/dyrtvwjfveyxjf23 | — | |
urlhttp://91.92.242.30/ece0f208u7uqhs6x | — | |
urlhttp://91.92.242.30/il24xgriequcys45 | — | |
urlhttp://91.92.242.30/l5ou8r739pc48rwi | — | |
urlhttp://91.92.242.30/lamq4uerkruo6ssm | — | |
urlhttp://91.92.242.30/q0c7ew2ro8l2cfqp | — | |
urlhttps://socifiapp.com/api/reports/upload | — | |
urlhttps://install.app-distribution.net/setup/ | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainsocifiapp.com | — | |
domaininstall.app-distribution.net | — |
Threat ID: 699d68e0be58cf853b9798e7
Added to database: 2/24/2026, 9:01:20 AM
Last enriched: 2/24/2026, 9:16:30 AM
Last updated: 2/24/2026, 9:23:36 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
North Korean Lazarus Group Now Working With Medusa Ransomware
MediumMoonrise RAT: A New Low-Detection Threat with High-Cost Consequences
MediumFake Zoom meeting 'update' silently installs surveillance software
MediumMaltrail IOC for 2026-02-24
Medium‘Arkanix Stealer’ Malware Disappears Shortly After Debut
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.