Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
Researchers discovered 341 malicious third-party skills on ClawHub, a marketplace for OpenClaw AI assistant users, which deliver data-stealing malware targeting macOS and Windows systems. These malicious skills use social engineering, fake prerequisites, and typosquatting to trick users into installing an Apple macOS stealer called Atomic Stealer (AMOS) and other malware. The malware harvests sensitive data including API keys, credentials, and crypto wallet keys. The open nature of ClawHub, allowing almost anyone to upload skills, facilitates this supply chain attack. The threat actors use sophisticated multi-stage payloads and command-and-control infrastructure to maintain persistence and exfiltrate data. This campaign highlights risks inherent in open-source AI ecosystems, especially those with persistent memory and external communication capabilities. European organizations using OpenClaw or similar AI assistants are at risk of credential theft and data exfiltration. Mitigations include restricting skill installation, verifying skill authenticity, and monitoring network traffic for suspicious connections. Countries with higher adoption of macOS and AI assistant usage, such as Germany, UK, France, and the Nordics, are likely most affected. The threat is assessed as high severity due to the potential for credential compromise, ease of exploitation via social engineering, and broad impact on confidentiality and integrity.
AI Analysis
Technical Summary
The threat involves malicious third-party skills uploaded to ClawHub, a marketplace for OpenClaw AI assistant users, which has been found to host 341 malicious skills out of 2,857 audited. These skills masquerade as legitimate tools—such as cryptocurrency wallet trackers, YouTube utilities, finance tools, and Google Workspace integrations—but include hidden malicious payloads. The attack leverages social engineering by instructing users to install fake prerequisites, such as downloading a Windows trojan archive or running obfuscated macOS shell scripts. The macOS payload is a variant of Atomic Stealer (AMOS), a commercial stealer malware capable of keylogging and harvesting sensitive data including API keys, credentials, and crypto wallet private keys. The malware communicates with a command-and-control server at IP 91.92.242.30 to fetch additional payloads and exfiltrate stolen data. Some skills also contain reverse shell backdoors or exfiltrate bot credentials to attacker-controlled webhooks. The open nature of ClawHub, which only requires a minimal GitHub account age for publishers, allows threat actors to upload malicious skills easily. The persistent memory and external communication capabilities of OpenClaw AI assistants exacerbate the risk by enabling delayed and stateful attacks, such as time-shifted prompt injection and logic bombs. The campaign, dubbed ClawHavoc, demonstrates how open-source AI ecosystems can be exploited for supply chain attacks, posing significant risks to users who rely on these AI assistants for automation and data processing.
Potential Impact
For European organizations, this threat poses a significant risk of credential theft, including API keys, SSH credentials, browser passwords, and cryptocurrency wallet keys, potentially leading to unauthorized access to critical systems and financial assets. The malware's ability to persist and execute delayed attacks increases the difficulty of detection and remediation. Organizations using OpenClaw or similar AI assistants for automation, especially those running on macOS systems, are vulnerable to supply chain compromise. The theft of sensitive credentials can lead to data breaches, financial loss, and reputational damage. Additionally, the presence of reverse shells and backdoors can facilitate further lateral movement within networks. The campaign's use of social engineering to trick users into executing malicious commands increases the likelihood of successful exploitation. The open-source nature of the ecosystem means that even organizations with strong perimeter defenses may be exposed if internal users install malicious skills. This threat also highlights the broader risk of AI assistant platforms being leveraged as attack vectors, which could impact compliance with data protection regulations such as GDPR if personal data is compromised.
Mitigation Recommendations
European organizations should implement strict controls on the installation of third-party skills in OpenClaw environments, including whitelisting verified publishers and skills. Employ multi-factor authentication and role-based access controls to limit who can install or update skills. Conduct thorough code reviews and static analysis of any third-party skills before deployment. Educate users about the risks of following installation instructions that require running scripts or downloading files from untrusted sources. Monitor network traffic for connections to known malicious IP addresses such as 91.92.242.30 and unusual outbound data flows. Use endpoint detection and response (EDR) solutions on macOS and Windows systems to detect keylogging and suspicious processes. Leverage OpenClaw's reporting feature to flag and auto-hide suspicious skills. Regularly audit installed skills and remove any that are unverified or no longer needed. Implement logging and alerting for changes in AI assistant behavior or unexpected command executions. Finally, maintain up-to-date backups and incident response plans tailored to supply chain and AI assistant-related threats.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Norway, Denmark, Finland, Switzerland, Belgium
Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
Description
Researchers discovered 341 malicious third-party skills on ClawHub, a marketplace for OpenClaw AI assistant users, which deliver data-stealing malware targeting macOS and Windows systems. These malicious skills use social engineering, fake prerequisites, and typosquatting to trick users into installing an Apple macOS stealer called Atomic Stealer (AMOS) and other malware. The malware harvests sensitive data including API keys, credentials, and crypto wallet keys. The open nature of ClawHub, allowing almost anyone to upload skills, facilitates this supply chain attack. The threat actors use sophisticated multi-stage payloads and command-and-control infrastructure to maintain persistence and exfiltrate data. This campaign highlights risks inherent in open-source AI ecosystems, especially those with persistent memory and external communication capabilities. European organizations using OpenClaw or similar AI assistants are at risk of credential theft and data exfiltration. Mitigations include restricting skill installation, verifying skill authenticity, and monitoring network traffic for suspicious connections. Countries with higher adoption of macOS and AI assistant usage, such as Germany, UK, France, and the Nordics, are likely most affected. The threat is assessed as high severity due to the potential for credential compromise, ease of exploitation via social engineering, and broad impact on confidentiality and integrity.
AI-Powered Analysis
Technical Analysis
The threat involves malicious third-party skills uploaded to ClawHub, a marketplace for OpenClaw AI assistant users, which has been found to host 341 malicious skills out of 2,857 audited. These skills masquerade as legitimate tools—such as cryptocurrency wallet trackers, YouTube utilities, finance tools, and Google Workspace integrations—but include hidden malicious payloads. The attack leverages social engineering by instructing users to install fake prerequisites, such as downloading a Windows trojan archive or running obfuscated macOS shell scripts. The macOS payload is a variant of Atomic Stealer (AMOS), a commercial stealer malware capable of keylogging and harvesting sensitive data including API keys, credentials, and crypto wallet private keys. The malware communicates with a command-and-control server at IP 91.92.242.30 to fetch additional payloads and exfiltrate stolen data. Some skills also contain reverse shell backdoors or exfiltrate bot credentials to attacker-controlled webhooks. The open nature of ClawHub, which only requires a minimal GitHub account age for publishers, allows threat actors to upload malicious skills easily. The persistent memory and external communication capabilities of OpenClaw AI assistants exacerbate the risk by enabling delayed and stateful attacks, such as time-shifted prompt injection and logic bombs. The campaign, dubbed ClawHavoc, demonstrates how open-source AI ecosystems can be exploited for supply chain attacks, posing significant risks to users who rely on these AI assistants for automation and data processing.
Potential Impact
For European organizations, this threat poses a significant risk of credential theft, including API keys, SSH credentials, browser passwords, and cryptocurrency wallet keys, potentially leading to unauthorized access to critical systems and financial assets. The malware's ability to persist and execute delayed attacks increases the difficulty of detection and remediation. Organizations using OpenClaw or similar AI assistants for automation, especially those running on macOS systems, are vulnerable to supply chain compromise. The theft of sensitive credentials can lead to data breaches, financial loss, and reputational damage. Additionally, the presence of reverse shells and backdoors can facilitate further lateral movement within networks. The campaign's use of social engineering to trick users into executing malicious commands increases the likelihood of successful exploitation. The open-source nature of the ecosystem means that even organizations with strong perimeter defenses may be exposed if internal users install malicious skills. This threat also highlights the broader risk of AI assistant platforms being leveraged as attack vectors, which could impact compliance with data protection regulations such as GDPR if personal data is compromised.
Mitigation Recommendations
European organizations should implement strict controls on the installation of third-party skills in OpenClaw environments, including whitelisting verified publishers and skills. Employ multi-factor authentication and role-based access controls to limit who can install or update skills. Conduct thorough code reviews and static analysis of any third-party skills before deployment. Educate users about the risks of following installation instructions that require running scripts or downloading files from untrusted sources. Monitor network traffic for connections to known malicious IP addresses such as 91.92.242.30 and unusual outbound data flows. Use endpoint detection and response (EDR) solutions on macOS and Windows systems to detect keylogging and suspicious processes. Leverage OpenClaw's reporting feature to flag and auto-hide suspicious skills. Regularly audit installed skills and remove any that are unverified or no longer needed. Implement logging and alerting for changes in AI assistant behavior or unexpected command executions. Finally, maintain up-to-date backups and incident response plans tailored to supply chain and AI assistant-related threats.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html","fetched":true,"fetchedAt":"2026-02-03T08:48:30.844Z","wordCount":1387}
Threat ID: 6981b662f9fa50a62fb23212
Added to database: 2/3/2026, 8:48:34 AM
Last enriched: 2/3/2026, 8:49:02 AM
Last updated: 2/3/2026, 11:07:44 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-34021: Unrestricted upload of file with dangerous type in ELECOM CO.,LTD. WRC-1167GST2
MediumCVE-2024-25579: OS command injection in ELECOM CO.,LTD. WRC-1167GS2-B
MediumCVE-2026-1592: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
MediumCVE-2026-1591: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
MediumCVE-2026-24935: CWE-295 Improper Certificate Validation in ASUSTOR ADM
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.