Home Tech OpenClaw AI agents targeted by infostealer malware for the first time

OpenClaw AI agents targeted by infostealer malware for the first time

A hand reaching out to touch a futuristic rendering of an AI processor.
(Image credit: Shutterstock / NicoElNino)

Subscribe to our newsletter


  • Hudson Rock spots first infostealer attack stealing OpenClaw AI assistant configuration files
  • Stolen secrets (API keys, tokens) could grant access to linked apps like Telegram or calendars
  • Researchers warn infostealers may soon add dedicated modules to parse AI agent data, raising risks for professional workflow

Thanks to its overnight success and widespread adoption, OpenClaw has painted a large target on its back and is now being attacked by infostealers, after security researchers Hudson Rock claimed to have seen a first-of-its-kind attack in the wild.

OpenClaw (previously known as Clawdbot and Moltbot) is an open source AI assistant software designed to actually complete tasks, rather than just answer questions or generate multimedia. Users can set it up on their personal computers or servers, and connect it to apps such as Telegram, calendars, and similar, after which it can do practical tasks like managing emails, scheduling meetings and tasks, and automating workflows.

But to set it up properly, users must give it certain secrets such as API keys, or authentication tokens. These get stored in the tool’s configuration files which, if stolen, can grant attackers access to different apps and tools.

Live infections detected

Now, according to Hudson Rock, this is exactly what’s now happening:

“Hudson Rock has now detected a live infection where an infostealer successfully exfiltrated a victim’s OpenClaw configuration environment,” the company said in a report.

“This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the ‘souls’ and identities of personal AI agents.”

In this specific incident, the hackers weren’t targeting OpenClaw itself – they simply managed to deploy an infostealer that grabbed as many sensitive files from the compromised system as possible. However, Hudson Rock expects this to change “rapidly”, as more and more cybercriminals realize the value of OpenClaw configuration data.

“As AI agents like OpenClaw become more integrated into professional workflows, infostealer developers will likely release dedicated modules specifically designed to decrypt and parse these files, much like they do for Chrome or Telegram today,” the researchers concluded.

Via BleepingComputer


Best antivirus software header

The best antivirus for all budgets

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Source link

The post OpenClaw AI agents targeted by infostealer malware for the first time first appeared on TechToday.

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

Looking for an Apple Watch charging solution? This keychain gadget saved me

The Scosche WatchIt keychain is perfect for those wanting to make sure...

Keep your devices juiced up with $30 off the Anker Prime 3-in-1 Wireless Charging Station

SAVE $30: As of Feb. 17, get the Anker Prime 3-in-1 Wireless...

Oura Ring vs. Apple Watch: Here’s which health tracker is right for you

Still deciding whether to go with Oura’s smart ring or an Apple...

How to watch Borussia Dortmund vs. Atalanta online for free

TL;DR: Live stream Borussia Dortmund vs. Atalanta in the Champions League for...