MoltBot Skills exploited to distribute 400+ malware packages in days
嗯,用户让我用中文总结这篇文章,控制在100字以内,而且不需要特定的开头。首先,我得通读一下文章内容。 文章主要讲的是利用MoltBot技能传播恶意软件的情况。研究人员发现,在短短几天内,有超过400个恶意的OpenClaw包被上传,伪装成加密交易工具。这些恶意技能通过社交工程手段诱骗用户运行命令,安装窃取信息的恶意软件,影响Windows和macOS系统。 接下来,我需要提取关键点:400多个恶意包、MoltBot技能、几天内上传、伪装成加密工具、窃取密码和密钥、 ClawHub平台安全漏洞。 然后,把这些信息浓缩成一句话,不超过100字。确保涵盖主要事件和影响。 最后,检查是否符合用户的要求:中文、简洁、不使用特定开头。 </think> 研究人员发现利用MoltBot技能传播恶意软件,在数日内上传400多个伪装成加密交易工具的OpenClaw包。这些恶意技能通过社交工程诱骗用户运行命令,窃取密码和密钥。ClawHub平台缺乏安全审查,导致大量恶意技能上线。 2026-2-2 21:29:22 Author: securityaffairs.com(查看原文) 阅读量:5 收藏

MoltBot Skills exploited to distribute 400+ malware packages in days

Pierluigi Paganini February 02, 2026

Over 400 malicious OpenClaw packages were uploaded in days, using MoltBot skills to spread password-stealing malware.

Researchers uncovered a large malware campaign abusing AI skills for Claude Code and Moltbot users. Between late January and early February 2026, more than 400 malicious skills were published on ClawHub and GitHub, posing as crypto trading tools.

OpenClaw is an open-source personal AI assistant platform that lets users extend its capabilities by installing community-created “skills.” Formerly known as MoltBot and ClawdBot, it integrates with tools like Claude Code and often runs locally or via messaging apps, allowing skills to automate tasks, but also creating security risks if malicious skills are installed.

OpenSourceMalware researchers warn that these skills used social engineering to trick users into running commands that installed info-stealing malware on Windows and macOS, stealing crypto keys, credentials, and passwords. All samples shared the same command-and-control infrastructure, highlighting weak security across new AI skill registries.

The experts found that ClawHub’s AI skills registry lacks basic security checks, allowing hundreds of malicious skills to be published with payloads visible in plain text. A total of 386 skills were involved, mostly posing as crypto tools and using social engineering to trick users into downloading malware.

“An initial group of 28 malicious skills targeting Claude Code and Moltbot users were published to ClawHub and GitHub between January 27-29, 2026. A second larger group of 386 skills were published January 31-February 2.” reads the report published by OpenSourceMalware. “The skills masquerade as cryptocurrency trading automation tools and deliver information-stealing malware to macOS and Windows systems. “

One account, hightower6eu, dominated the campaign, uploading dozens of near-identical skills that became some of the most downloaded on the platform. Despite being notified, ClawHub’s maintainer admitted that the registry cannot be secured, and most malicious skills remain online.

The attack relied on social engineering in OpenClaw/ClawHub skills disguised as cryptocurrency tools. The documentation repeatedly instructed users to install so‑called “AuthTools,” presented as required authentication helpers but in reality fake utilities that lured victims into running commands that downloaded malware from a shared command‑and‑control server.

macOS and Windows users were targeted with scripts and binaries designed to bypass protections and steal crypto assets, credentials, and sensitive files. Hundreds of skills from multiple linked authors were involved, with many still available despite clear signs of malicious behavior.

The researchers pointed out that this campaign was a supply chain attack on Claude Code and Moltbot skills, using fake crypto-trading skills to trick users into installing info-stealing malware. It relied on social engineering and weak security reviews, targeting cryptocurrency traders for financial gain.

“This campaign represents a supply chain attack targeting the emerging Claude Code and Moltbot skills ecosystem. By publishing multiple professionally-documented malicious skills themed around cryptocurrency trading, the threat actor exploited the trust relationship between users and the skills platform to distribute information-stealing malware.” concludes the report. “The attack required no technical exploits, instead relying on social engineering and the lack of security review in the skills publication process. The targeting of cryptocurrency traders suggests financial motivation and careful selection of high-value victims.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, malware)




文章来源: https://securityaffairs.com/187562/malware/moltbot-skills-exploited-to-distribute-400-malware-packages-in-days.html
如有侵权请联系:admin#unsafe.sh