Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Low-Skilled Cybercriminals Use AI to Perform “Vibe Extortion” Attacks

February 17, 2026

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

February 17, 2026

Significant Rise in Ransomware Attacks Targeting Industrial Operations

February 17, 2026
Facebook X (Twitter) Instagram
Tuesday, February 17
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Infostealer Targets OpenClaw to Loot Victim’s Digital Life
News

Infostealer Targets OpenClaw to Loot Victim’s Digital Life

Team-CWDBy Team-CWDFebruary 17, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security researchers claim to have documented a major shift in the infostealer landscape after witnessing the first live attack targeting an OpenClaw configuration environment.

Formerly known as Clawdbot and Moltbot, OpenClaw is a popular agentic AI assistant that runs locally on a user’s machine.

The permissions users grant it to access sensitive data and systems, insecure default settings and plaintext storage of secrets have raised eyebrows in the security community.

Now threat actors appear to be actively hunting for those secrets, according to Hudson Rock.

“The infostealer utilized a broad file-grabbing routine designed to sweep for sensitive file extensions and specific directory names (like .openclaw),” the firm wrote in a blog post yesterday.

“While the malware may have been looking for standard ‘secrets,’ it inadvertently struck gold by capturing the entire operational context of the user’s AI assistant.”

Read more on OpenClaw: Hundreds of Malicious Crypto Trading Add-Ons Found in Moltbot/OpenClaw.

The infostealer documented by Hudson Rock stole:

  • The openclaw.json file, which enabled it to retrieve the victim’s email address, workspace path and high-entropy gateway token. The latter could enable an attacker to remotely connect to a local OpenClaw instance via an exposed port, or impersonate the client in authenticated requests to the AI gateway, the report noted
  • The device.json file which contains the publicKeyPem and privateKeyPem of the user’s device. These are used for secure pairing and signing operations in OpenClaw. An attacker with the private key could apparently bypass “safe device” checks, and access encrypted logs or paired cloud services
  • The soul.md and memory files (agents.md, memory.md), which provide a threat actor with “a blueprint of the user’s life.” Hudson Rock warned that the memory files likely contained sensitive daily logs of user activities, calendar events and private messages

“Hudson Rock’s AI system, Enki, performed an automated risk assessment on the exfiltrated files,” the report continued. “The analysis demonstrates how an attacker can leverage these disparate pieces of information, including tokens, keys, and personal context, to orchestrate a total compromise of the user’s digital identity.”

A New Era

The infostealer spotted in this attack was not specially designed to target ClawdBot or similar tools, but that is likely to change in the near future, Hudson Rock said.

“As AI agents like OpenClaw become more integrated into professional workflows, infostealer developers will likely release dedicated modules specifically designed to decrypt and parse these files, much like they do for Chrome or Telegram today,” it predicted.

“By stealing OpenClaw files, an attacker does not just get a password; they get a mirror of the victim’s life, a set of cryptographic keys to their local machine, and a session token to their most advanced AI models.”

Security experts have previously warned of a shadow AI risk if users link OpenClaw to enterprise systems.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers
Next Article Significant Rise in Ransomware Attacks Targeting Industrial Operations
Team-CWD
  • Website

Related Posts

News

Low-Skilled Cybercriminals Use AI to Perform “Vibe Extortion” Attacks

February 17, 2026
News

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

February 17, 2026
News

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

February 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What it is and how to protect yourself

January 8, 2026

Look out for phony verification pages spreading malware

September 14, 2025

Is it time for internet services to adopt identity verification?

January 14, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.