Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容和关键点。 文章主要讲的是网络安全研究人员发现了一个信息窃取软件感染案例,成功窃取了受害者的OpenClaw配置环境。这标志着信息窃取行为从盗取浏览器凭证转向收集个人AI代理的核心数据。攻击者通过广泛抓取文件,获取了包含敏感信息的文件,如配置文件和加密密钥。此外,文章还提到OpenClaw的安全问题,包括恶意技能分发、无法删除的AI账户以及大量暴露的实例带来的远程代码执行风险。 接下来,我需要将这些关键点浓缩到100字以内。要确保涵盖主要事件:信息窃取软件攻击OpenClaw配置、窃取核心数据、利用广泛文件抓取技术、以及相关的安全问题和风险。 可能的结构是:先说明攻击事件及其影响,然后提到具体的数据窃取方式和后果,最后简要提及相关的安全漏洞。 现在试着组织语言: 研究人员发现信息窃取软件成功窃取OpenClaw配置环境,标志着攻击行为从盗取浏览器凭证转向收集AI代理的核心数据。攻击者通过广泛抓取文件获取敏感信息,并利用这些数据进行潜在的远程控制或冒充请求。此外,OpenClaw面临恶意技能分发、无法删除账户及大量暴露实例带来的远程代码执行风险。 检查字数是否在100字以内,并调整措辞使其更简洁明了。 </think> 研究人员发现信息窃取软件成功窃取OpenClaw配置环境,标志着攻击行为从盗取浏览器凭证转向收集AI代理的核心数据。攻击者通过广泛抓取文件获取敏感信息,并利用这些数据进行潜在的远程控制或冒充请求。此外,OpenClaw面临恶意技能分发、无法删除账户及大量暴露实例带来的远程代码执行风险。 2026-2-16 18:43:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Artificial Intelligence / Threat Intelligence

Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim's OpenClaw (formerly Clawdbot and Moltbot) configuration environment.

"This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the 'souls' and identities of personal AI [artificial intelligence] agents," Hudson Rock said.

Alon Gal, CTO of Hudson Rock, told The Hacker News that the stealer was likely a variant of Vidar based on the infection details. Vidar is an off-the-shelf information stealer that's known to be active since late 2018.

That said, the cybersecurity company said the data capture was not facilitated by a custom OpenClaw module within the stealer malware, but rather through a "broad file-grabbing routine" that's designed to look for certain file extensions and specific directory names containing sensitive data.

This included the following files -

  • openclaw.json, which contains details related to the OpenClaw gateway token, along with the victim's redacted email address and workspace path.
  • device.json, which contains cryptographic keys for secure pairing and signing operations within the OpenClaw ecosystem.
  • soul.md, which contains details of the agent's core operational principles, behavioral guidelines, and ethical boundaries.

It's worth noting that the theft of the gateway authentication token can allow an attacker to connect to the victim's local OpenClaw instance remotely if the port is exposed, or even masquerade as the client in authenticated requests to the AI gateway.

"While the malware may have been looking for standard 'secrets,' it inadvertently struck gold by capturing the entire operational context of the user's AI assistant," Hudson Rock added. "As AI agents like OpenClaw become more integrated into professional workflows, infostealer developers will likely release dedicated modules specifically designed to decrypt and parse these files, much like they do for Chrome or Telegram today."

The disclosure comes as security issues with OpenClaw prompted the maintainers of the open-source agentic platform to announce a partnership with VirusTotal to scan for malicious skills uploaded to ClawHub, establish a threat model, and add the ability to audit for potential misconfigurations.

Last week, the OpenSourceMalware team detailed an ongoing ClawHub malicious skills campaign that uses a new technique to bypass VirusTotal scanning by hosting the malware on lookalike OpenClaw websites and using the skills purely as decoys, instead of embedding the payload directly in their SKILL.md files.

"The shift from embedded payloads to external malware hosting shows threat actors adapting to detection capabilities," security researcher Paul McCarty said. "As AI skill registries grow, they become increasingly attractive targets for supply chain attacks."

Another security problem highlighted by OX Security concerns Moltbook, a Reddit-like internet forum designed exclusively for artificial intelligence agents, mainly those running on OpenClaw. The research found that an AI Agent account, once created on Moltbook, cannot be deleted. This means that users who wish to delete the accounts and remove the associated data have no recourse.

What's more, an analysis published by SecurityScorecard's STRIKE Threat Intelligence team has also found hundreds of thousands of exposed OpenClaw instances, likely exposing users to remote code execution (RCE) risks.

Fake OpenClaw Website Serving Malware

"RCE vulnerabilities allow an attacker to send a malicious request to a service and execute arbitrary code on the underlying system," the cybersecurity company said. "When OpenClaw runs with permissions to email, APIs, cloud services, or internal resources, an RCE vulnerability can become a pivot point. A bad actor does not need to break into multiple systems. They need one exposed service that already has authority to act."

OpenClaw has had a viral surge in interest since it first debuted in November 2025. As of writing, the open-source project has more than 200,000 stars on GitHub. On February 15, 2026, OpenAI CEO Sam Altman said OpenClaw's founder, Peter Steinberger, would be joining the AI company, adding, "OpenClaw will live in a foundation as an open source project that OpenAI will continue to support."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/infostealer-steals-openclaw-ai-agent.html
如有侵权请联系:admin#unsafe.sh