Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware
好的,我现在需要帮用户总结一篇关于OpenClaw恶意安装程序的文章,控制在100字以内。首先,我得通读文章,抓住关键点。 文章提到,假的OpenClaw安装程序托管在GitHub上,并通过微软Bing的AI搜索功能推广。这些安装程序诱导用户运行命令,部署信息窃取器和代理恶意软件。OpenClaw是一个开源AI代理,作为个人助手很受欢迎,能够访问本地文件和集成各种应用。 威胁分子利用其广泛的本地访问权限,在官方注册表和GitHub上发布恶意技能。Huntress的研究人员发现了一个新活动,传播了多个恶意软件加载器和信息窃取器的可执行文件。攻击者创建了伪装成OpenClaw安装程序的恶意GitHub仓库,并被Bing的AI搜索结果推荐。 研究人员指出,只需将恶意软件托管在GitHub上就足以污染Bing的AI搜索结果。假仓库看起来很真实,使用了与真实代码类似的项目,并被Bing推荐给寻找OpenClaw Windows版本的用户。 对于macOS用户,安装指南引导用户运行bash命令,下载包含Atomic Stealer恶意软件的文件。Windows用户则会下载OpenClaw_x64.exe,部署多个恶意可执行文件,包括Vidar窃取器和GhostSocks代理恶意软件。 攻击者利用这些系统访问被盗凭据,并绕过反欺诈检查。Huntress报告了多个用于同一活动的账户和仓库,但不清楚是否已被移除。建议用户直接访问官方GitHub仓库以避免受骗。 总结时要涵盖:假安装程序、GitHub托管、Bing推广、诱导运行命令、部署信息窃取器和代理软件、攻击者利用OpenClaw的流行性、以及建议访问官方资源。 </think> 假 OpenClaw 安装程序托管在 GitHub 上并通过 Bing AI 搜索推广,诱导用户运行命令以部署信息窃取器和代理恶意软件。攻击者利用 OpenClaw 的流行性和本地访问权限,在 GitHub 和官方注册表中发布恶意技能文件。研究人员发现多个伪装成 OpenClaw 安装程序的恶意仓库被 Bing AI 推荐给用户。这些仓库提供虚假安装指南,引导用户下载包含 Atomic Stealer 和 Vidar 等恶意软件的文件。建议用户直接访问 OpenClaw 的官方 GitHub 仓库以避免受骗。 2026-3-5 22:45:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:7 收藏

Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware

Fake OpenClaw installers hosted in GitHub repositories and promoted by Microsoft Bing’s AI-enhanced search feature instructed users to run commands that deployed information stealers and proxy malware.

OpenClaw is an open-source AI agent that gained popularity as a personal assistant capable of executing tasks. It has access to local files and can integrate with email, messaging apps, and online services.

Due to its widespread local access, threat actors saw an opportunity to collect sensitive information by publishing malicious skills (instruction files) on the tool's official registry and GitHub.

Researchers at managed detection and response company Huntress discovered a new campaign last month that spread multiple executables for malware loaders and infostealers to users looking to install OpenClaw.

According to the researchers, the threat actor set up malicious GitHub repositories posing as OpenClaw installers, which were recommended by Bing in its AI-powered search results for the Windows version of the tool.

Malicious Bing AI Search results
Malicious Bing AI Search results
Source: Huntress

Bing AI's suggested download link in the image above points to a malicious OpenClaw installer on GitHub, Huntress researchers said in a report.

The researchers say that "just hosting the malware on GitHub was enough to poison Bing AI search results."

A fake OpenClaw repository that Huntress analyzed appeared legitimate at a quick look, as the threat actor tied it to a GitHub organization named openclaw-installer. This may also have carried some weight in Bing's AI recommendation.

The GitHub accounts publishing these repositories were newly created, but attempted to increase their legitimacy by copying real code from the Cloudflare moltworker project.

Example of a malicious GitHub repository
Example of a malicious GitHub repository
Source: Huntress

However, the repository provided an installation guide for OpenClaw on macOS, instructing the user to paste a bash command in Terminal. This would reach a separate GitHub organization called puppeteerrr and a repository named dmg.

"The repository contained a number of files that followed a theme of containing a shell script paired with a Mach-O executable," which Huntress identified as the Atomic Stealer malware.

Malicious OpenClaw installation instructions for macOS users
Malicious OpenClaw installation instructions for macOS users
S​​​​​source: Huntress

For Windows users, the threat actor used the fake repositories to deliver OpenClaw_x64.exe, which deployed multiple malicious executables. Huntress says that the Windows Managed AV and Managed Defender for Endpoint solutions quarantined the files on the customer's machine that they analyzed.

Most of the executables were Rust-based malware loaders that executed information stealers in memory, the researchers said, adding that one of the payloads was Vidar stealer that contacted Telegram and Steam user profiles to get command-and-control (C2) data.

Another Windows executable delivered this way was the GhostSocks backconnect proxy malware, designed to convert users' machines into a proxy node.

An attacker can use the system to access accounts with credentials stolen from the machine, thus bypassing anti-fraud checks. Threat actors also use proxy nodes to route malicious traffic or to hide their tracks in attacks.

While investigating, Huntress identified multiple accounts and repositories used in the same campaign, which delivered malware to users seeking OpenClaw installers.

All of the malicious repositories have been reported to GitHub, though it’s unclear if they have been removed by now.

The official OpenClaw repository on GitHub is here. It is recommended to bookmark the official portals of the software you’re using instead of searching online each time.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware/
如有侵权请联系:admin#unsafe.sh