Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users

0
Medium
Vulnerability
Published: Mon Feb 02 2026 (02/02/2026, 17:49:00 UTC)
Source: The Hacker News

Description

Researchers discovered 341 malicious third-party skills on ClawHub, a marketplace for OpenClaw AI assistant users, which deliver data-stealing malware targeting macOS and Windows systems. These malicious skills use social engineering, fake prerequisites, and typosquatting to trick users into installing an Apple macOS stealer called Atomic Stealer (AMOS) and other malware. The malware harvests sensitive data including API keys, credentials, and crypto wallet keys. The open nature of ClawHub, allowing almost anyone to upload skills, facilitates this supply chain attack. The threat actors use sophisticated multi-stage payloads and command-and-control infrastructure to maintain persistence and exfiltrate data. This campaign highlights risks inherent in open-source AI ecosystems, especially those with persistent memory and external communication capabilities. European organizations using OpenClaw or similar AI assistants are at risk of credential theft and data exfiltration. Mitigations include restricting skill installation, verifying skill authenticity, and monitoring network traffic for suspicious connections. Countries with higher adoption of macOS and AI assistant usage, such as Germany, UK, France, and the Nordics, are likely most affected. The threat is assessed as high severity due to the potential for credential compromise, ease of exploitation via social engineering, and broad impact on confidentiality and integrity.

AI-Powered Analysis

AILast updated: 02/03/2026, 08:49:02 UTC

Technical Analysis

The threat involves malicious third-party skills uploaded to ClawHub, a marketplace for OpenClaw AI assistant users, which has been found to host 341 malicious skills out of 2,857 audited. These skills masquerade as legitimate tools—such as cryptocurrency wallet trackers, YouTube utilities, finance tools, and Google Workspace integrations—but include hidden malicious payloads. The attack leverages social engineering by instructing users to install fake prerequisites, such as downloading a Windows trojan archive or running obfuscated macOS shell scripts. The macOS payload is a variant of Atomic Stealer (AMOS), a commercial stealer malware capable of keylogging and harvesting sensitive data including API keys, credentials, and crypto wallet private keys. The malware communicates with a command-and-control server at IP 91.92.242.30 to fetch additional payloads and exfiltrate stolen data. Some skills also contain reverse shell backdoors or exfiltrate bot credentials to attacker-controlled webhooks. The open nature of ClawHub, which only requires a minimal GitHub account age for publishers, allows threat actors to upload malicious skills easily. The persistent memory and external communication capabilities of OpenClaw AI assistants exacerbate the risk by enabling delayed and stateful attacks, such as time-shifted prompt injection and logic bombs. The campaign, dubbed ClawHavoc, demonstrates how open-source AI ecosystems can be exploited for supply chain attacks, posing significant risks to users who rely on these AI assistants for automation and data processing.

Potential Impact

For European organizations, this threat poses a significant risk of credential theft, including API keys, SSH credentials, browser passwords, and cryptocurrency wallet keys, potentially leading to unauthorized access to critical systems and financial assets. The malware's ability to persist and execute delayed attacks increases the difficulty of detection and remediation. Organizations using OpenClaw or similar AI assistants for automation, especially those running on macOS systems, are vulnerable to supply chain compromise. The theft of sensitive credentials can lead to data breaches, financial loss, and reputational damage. Additionally, the presence of reverse shells and backdoors can facilitate further lateral movement within networks. The campaign's use of social engineering to trick users into executing malicious commands increases the likelihood of successful exploitation. The open-source nature of the ecosystem means that even organizations with strong perimeter defenses may be exposed if internal users install malicious skills. This threat also highlights the broader risk of AI assistant platforms being leveraged as attack vectors, which could impact compliance with data protection regulations such as GDPR if personal data is compromised.

Mitigation Recommendations

European organizations should implement strict controls on the installation of third-party skills in OpenClaw environments, including whitelisting verified publishers and skills. Employ multi-factor authentication and role-based access controls to limit who can install or update skills. Conduct thorough code reviews and static analysis of any third-party skills before deployment. Educate users about the risks of following installation instructions that require running scripts or downloading files from untrusted sources. Monitor network traffic for connections to known malicious IP addresses such as 91.92.242.30 and unusual outbound data flows. Use endpoint detection and response (EDR) solutions on macOS and Windows systems to detect keylogging and suspicious processes. Leverage OpenClaw's reporting feature to flag and auto-hide suspicious skills. Regularly audit installed skills and remove any that are unverified or no longer needed. Implement logging and alerting for changes in AI assistant behavior or unexpected command executions. Finally, maintain up-to-date backups and incident response plans tailored to supply chain and AI assistant-related threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html","fetched":true,"fetchedAt":"2026-02-03T08:48:30.844Z","wordCount":1387}

Threat ID: 6981b662f9fa50a62fb23212

Added to database: 2/3/2026, 8:48:34 AM

Last enriched: 2/3/2026, 8:49:02 AM

Last updated: 2/3/2026, 11:07:44 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats