Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Multi-Stage “BadPaw” Malware Campaign Targets Ukraine

March 5, 2026

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

March 5, 2026

Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers

March 5, 2026
Facebook X (Twitter) Instagram
Thursday, March 5
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ClawJacked Bug Enables Covert AI Agent Hijacking
News

ClawJacked Bug Enables Covert AI Agent Hijacking

Team-CWDBy Team-CWDMarch 2, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


OpenClaw users have been urged to upgrade to the latest version of the tool after researchers revealed how an indirect prompt injection attack could give adversaries full remote control.

The “ClawJacked” bug is a high-severity issue in the popular AI assistant platform.

“At its core, OpenClaw runs a gateway, a local WebSocket server that acts as the brain of the operation. The gateway handles authentication, manages chat sessions, stores configuration and orchestrates the AI agent,” Oasis Security explained.

“Connected to the gateway are nodes – these can be the macOS companion app, an iOS device, or other machines. Nodes register with the gateway and expose capabilities, running system commands, accessing the camera, reading contacts and more. The gateway can dispatch commands to any connected node.”

The problem is that the gateway binds to localhost by default, because it assumes that local access is inherently trusted. However, if a user visits a malicious site, this assumption breaks down.

The report explained that an attack could look like this:

  1. JavaScript on the page opens a WebSocket connection to localhost on the OpenClaw gateway port. This is permitted because WebSocket connections to localhost are not blocked by cross-origin policies
  2. The script brute-forces the gateway password at hundreds of attempts per second. The gateway’s rate limiter exempts localhost connections entirely
  3. Once authenticated, the script silently registers as a trusted device. The gateway auto-approves device pairings from localhost with no user prompt

One these steps have been achieved, the attacker has full control over the OpenClaw instance – enabling them to interact with the agent, dump configuration data, enumerate connected devices and read logs, Oasis Security warned.

Read more on OpenClaw: Researchers Find 40,000+ Exposed OpenClaw Instances.

Users Urged to Update OpenClaw

The research team urged OpenClaw users to upgrade to version 2026.2.25 or later immediately, praising the volunteers that manage the open source project for their swift fix.

However, this is just one of many OpenClaw security scares to surface over recent weeks. Numerous vulnerabilities and hundreds of malicious add-ons (“skills”) have been discovered in the platform ecosystem, and infostealers are known to be targeting the popular AI tool.

Oasis Security recommended organizations:

  • Gain visibility into all of their AI usage by inventorying which agents and assistants are running across developer environments
  • Update all OpenClaw instances immediately to the latest version
  • Review access rights granted to AI agents and revoke anything that isn’t actively required
  • Establish governance strategy for non-human identities based around intent analysis, policy enforcement, just-in-time access and a full audit trail “from human to agent to action”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog
Next Article Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
Team-CWD
  • Website

Related Posts

News

Multi-Stage “BadPaw” Malware Campaign Targets Ukraine

March 5, 2026
News

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

March 5, 2026
News

Global Takedown Neutralizes Tycoon2FA Phishing Service

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Watch out for SVG files booby-trapped with malware

September 22, 2025

Mobile app permissions (still) matter more than you may think

February 27, 2026

Is it time for internet services to adopt identity verification?

January 14, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.