Hackers steal OpenClaw configuration in emerging AI agent threat
嗯,用户让我总结这篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是黑客窃取了OpenClaw的配置信息,这是一个AI代理平台。研究人员发现了一个信息窃取者,它不仅偷了浏览器密码,还瞄准了AI代理的身份和设置。被窃取的文件包括配置文件、密钥和“灵魂”文件,这些信息让攻击者可以控制用户的AI代理,甚至整个数字身份。 所以,总结的时候要包括:黑客窃取OpenClaw配置,影响AI代理安全,以及被窃取的信息带来的风险。要简洁明了,控制在100字以内。 可能的结构是:黑客窃取OpenClaw配置文件和密钥,导致AI代理身份和设置被获取,威胁用户数字身份安全。 检查一下是否符合要求:没有使用“文章内容总结”之类的开头,直接描述内容。字数控制在100字以内。 最后确定一下语言是否通顺自然。 </think> 黑客窃取OpenClaw配置文件和密钥,导致个人AI代理的身份、设置和“灵魂”被获取,威胁用户数字身份安全。 2026-2-17 10:11:44 Author: securityaffairs.com(查看原文) 阅读量:0 收藏

Hackers steal OpenClaw configuration in emerging AI agent threat

Pierluigi Paganini February 17, 2026

Researchers found an infostealer stole a victim’s OpenClaw configuration, marking a shift toward targeting personal AI agents.

Cybersecurity researchers have uncovered a new information stealer that exfiltrated a victim’s OpenClaw configuration environment, previously known as Clawdbot and Moltbot. According to cybersecurity firm Hudson Rock, the case highlights a new shift in infostealer activity, moving beyond stealing browser passwords to targeting the identities, settings, and “digital souls” of personal AI agents.

“Following our initial research into ClawdBot, Hudson Rock has now detected a live infection where an infostealer successfully exfiltrated a victim’s OpenClaw configuration environment.” reads the report published by Hudson Rock. “This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the “souls” and identities of personal AI agents.”

OpenClaw is an open-source personal AI assistant platform that lets users extend its capabilities by installing community-created “skills.” Formerly known as MoltBot and ClawdBot, it integrates with tools like Claude Code and often runs locally or via messaging apps, allowing skills to automate tasks, but also creating security risks if malicious skills are installed.

The researchers described the incident as a “grab-bag” attack: the infostealer did not use a dedicated OpenClaw module but a broad file-harvesting routine that scooped up sensitive extensions and folders, unintentionally capturing the full operational environment of the victim’s OpenClaw AI agent. Stolen files included openclaw.json with gateway tokens, device.json containing private cryptographic keys, and “soul” and memory files outlining the agent’s behavior and personal context.

“The openclaw.json file acts as the central nervous system for the agent. In this specific case, the attacker retrieved the victim’s redacted email address (ayou...[at]gmail.com), their workspace path, and a high-entropy Gateway Token.” continues the report. “Technical Risk: The exposed gateway.auth.token allows an attacker to connect to the victim’s local OpenClaw instance remotely if the port is exposed, or to impersonate the client in authenticated requests to the AI gateway.”

OpenClaw private key

According to Hudson Rock, this data could allow attackers to impersonate the user’s device, access encrypted services, and effectively compromise the victim’s entire digital identity.

“This case is a stark reminder that infostealers are no longer just looking for your bank login. They are looking for your context. By stealing OpenClaw files, an attacker does not just get a password; they get a mirror of the victim’s life, a set of cryptographic keys to their local machine, and a session token to their most advanced AI models.” concludes the report. “As AI agents move from experimental toys to daily essentials, the incentive for malware authors to build specialized “AI-stealer” modules will only grow.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, OpenClaw)




文章来源: https://securityaffairs.com/188097/malware/hackers-steal-openclaw-configuration-in-emerging-ai-agent-threat.html
如有侵权请联系:admin#unsafe.sh