Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Warns: Hackers Use AI to Create Zero- Using Working
May 11, 2026
Go Library fsnotify: Supply Chain Alarms After Access Changes
May 11, 2026
Hackers Use PlugX DLL Sideloading in PlugX-Like Chain
May 11, 2026
Home/CyberSecurity News/Threat Actors Abuse OpenClaw AI Agent Skills to Deliver
CyberSecurity News

Threat Actors Abuse OpenClaw AI Agent Skills to Deliver

Threat actors are deploying hundreds of malicious skills, often disguised as legitimate automation tools, to deliver trojans, infostealers, and backdoors. VirusTotal has uncovered a significant...

David kimber
David kimber
February 3, 2026 3 Min Read
2 0

Threat actors are deploying hundreds of malicious skills, often disguised as legitimate automation tools, to deliver trojans, infostealers, and backdoors.

VirusTotal has uncovered a significant malware distribution campaign targeting OpenClaw, a rapidly growing personal AI agent ecosystem.

OpenClaw, previously known as Clawdbot and briefly as Moltbot, is a self-hosted AI agent that executes real system actions, including shell commands, file operations, and network requests.

OpenClaw Skill Abuse Campaign

The platform extends functionality through skills, small packages built around SKILL.md files that users discover and install from ClawHub, the public marketplace for OpenClaw extensions.

Users run untrusted code during setup(source : VirusTotal)
Users run untrusted code during setup (source: VirusTotal)

While this architecture enables powerful automation capabilities, it creates a dangerous attack surface.

Skills run as third-party code with complete system access, often requiring users to paste commands into terminals, download binaries, or execute scripts during setup.

Threat actors are exploiting this trust model to distribute malware through seemingly helpful tools.

A Mach-O binary flagged by 16 engines( source : VirusTotal)
A Mach-O binary flagged by 16 engines (source: VirusTotal)

VirusTotal Code Insight has analyzed over 3,016 OpenClaw skills, and hundreds of them exhibit malicious characteristics.

Base64-obfuscated macOS script( source : VirusTotal)
Base64-obfuscated macOS script( source : VirusTotal)

The analysis, powered by Gemini 3 Flash, examines security behaviors such as external code execution, sensitive data access, and unsafe network operations, rather than relying solely on traditional antivirus signatures.

Gemini 3 Pro flags it as AMOS infostealer( source : VirusTotal)
Gemini 3 Pro flags it as AMOS infostealer( source : VirusTotal)

Security researchers identified two distinct threat categories: skills that contain poor security practices, such as insecure APIs, hardcoded secrets, and unsafe command execution.

Intentionally malicious skills designed for data exfiltration, remote control, and malware installation.

Prolific Malware Publisher

A particularly concerning case involves ClawHub user “hightower6eu,” who published 314 malicious skills covering crypto analytics, finance tracking, and social media analysis.

Each skill instructs users to download and execute external code from untrusted sources during setup. One example, a “Yahoo Finance” skill, appeared clean to traditional antivirus engines.

However, VirusTotal Code Insight identified instructions directing Windows users to download a password-protected ZIP file containing openclaw-agent.exe, which multiple vendors have detected as a packed trojan.

For macOS users, the skill pointed to a Base64-obfuscated shell script on glot.io. That downloaded and executed a Mach-O binary identified as Atomic Stealer (AMOS), an infostealer targeting passwords, browser credentials, and cryptocurrency wallets.

Organizations and users should treat skill folders as trusted-code boundaries, implement sandboxed execution, and avoid skills that require shell commands or binary downloads.

Marketplace operators should implement publish-time scanning to flag remote execution and obfuscated scripts.

VirusTotal is exploring integration with OpenClaw’s publishing workflow to provide automated security analysis during skill submission.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Notepad++ Hack: IoCs & Custom Malware Details Detailed Along

Next Post

Malicious Google Play App with 50K+ Downloads Deploy Anatsa

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
ShinyHunters Breaches Instructure Canvas LMS Free-
May 11, 2026
Hugging Face Repo with 200k Downloads Inst Trending Repository
May 11, 2026
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us