Infostealer malware found stealing OpenClaw secrets for first time
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读文章,抓住主要信息。 文章讲的是OpenClaw这个AI代理框架被广泛使用后,出现了恶意软件窃取相关配置文件的情况。Hudson Rock报告了首个恶意软件窃取OpenClaw文件的案例,这些文件包含API密钥和认证令牌等敏感信息。攻击者利用这些信息可能完全控制受害者的数字身份。同时,另一个类似的AI工具Nanobot也发现了高危漏洞。 接下来,我需要将这些要点浓缩到100字以内。要确保涵盖主要事件:恶意软件窃取OpenClaw文件、包含敏感信息、可能导致身份被完全控制,以及Nanobot的漏洞情况。 可能的结构是:先说明事件发生,然后指出影响和相关工具的问题。这样既简洁又全面。 最后检查一下字数,确保不超过限制,并且表达清晰。 </think> OpenClaw AI代理框架因其广泛应用而成为恶意软件攻击目标,研究人员发现首个恶意软件窃取其配置文件案例,可能导致用户数字身份被完全控制。同时,类似工具Nanobot被曝高危漏洞。 2026-2-16 17:45:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

OpenClaw

With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens, and other secrets.

OpenClaw (formerly ClawdBot and MoltBot) is a local-running AI agent framework that maintains a persistent configuration and memory environment on the user's machine. The tool can access local files, log in to email and communication apps on the host, and interact with online services.

Since its release, OpenClaw has seen widespread adoption worldwide, with users using it to help manage everyday tasks and act as an AI assistant.

Wiz

However, there has been concern that, given its popularity, threat actors may begin targeting the framework's configuration files, which contain authentication secrets used by the AI agent to access cloud-based services and AI platforms.

Infostealer spotted stealing OpenClaw files

Hudson Rock says they have documented the first in-the-wild instance of infostealers stealing files associated with OpenClaw to extract secrets stored within them.

"Hudson Rock has now detected a live infection where an infostealer successfully exfiltrated a victim's OpenClaw configuration environment," reads the report.

"This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the 'souls' and identities of personal AI agents."

HudsonRock had predicted this development since late last month, calling OpenClaw "the new primary target for infostealers" due to the highly sensitive data the agents handle and their relatively lax security posture.

Alon Gal, co-founder and CTO of Hudson Rock, told BleepingComputer that it is believed to be a variant of the Vidar infostealer, with the data stolen on February 13, 2026, when the infection took place.

Gal said the infostealer does not appear to target OpenClaw specifically, but instead executes a broad file-stealing routine that scans for sensitive files and directories containing keywords like "token" and "private key."

As the files in the ".openclaw" configuration directory contained these keywords and others, they were stolen by the malware.

The OpenClaw files stolen by the malware are:

  • openclaw.json – Exposed the victim's redacted email, workspace path, and a high-entropy gateway authentication token, which could enable remote connection to a local OpenClaw instance (if exposed) or client impersonation in authenticated requests.
  • device.json – Contained both publicKeyPem and privateKeyPem used for pairing and signing. With the private key, an attacker could sign messages as the victim's device, potentially bypass "Safe Device" checks, and access encrypted logs or cloud services paired with the device.
  • soul.md and memory files (AGENTS.md, MEMORY.md) – Define the agent's behavior and store persistent contextual data, including daily activity logs, private messages, and calendar events.
Openclaw.json (left) and soul.md (right)
Openclaw.json (left) and soul.md (right)
Source: HudsonRock

HudsonRock's AI analysis tool concluded that the stolen data is enough to potentially enable a full compromise of the victim's digital identity.

The researchers comment that they expect information stealers to continue focusing on OpenClaw as the tool becomes increasingly integrated into professional workflows, incorporating more targeted mechanisms for AI agents.

Meanwhile, Tenable discovered a max-severity flaw in nanobot, an ultra-lightweight personal AI assistant inspired by OpenClaw, that could potentially allow remote attackers to hijack WhatsApp sessions via exposed instances fully.

Nanobot, released two weeks ago, already has 20k stars and over 3k forks on GitHub. The team behind the project released fixes for the flaw, tracked under CVE-2026-2577, in version 0.13.post7.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/infostealer-malware-found-stealing-openclaw-secrets-for-first-time/
如有侵权请联系:admin#unsafe.sh