On February 4th, a password management tool, Password, published a book on February 2nd, and its security team discovered that the attackers had used the fire-fire AI smarts OpenClaw (formerly known as Clawdbot and Moltbot) to spread and implant malicious software to MacOS users. The attackers made use of OpenClaw's “Skills” files, which are usually in Markdown format and are used to guide AI on new assignments, but are disguised by hackers as a legitimate integrated curriculum. During a seemingly conventional setting, the document induces the user to copy and run a Shell command. The command will be decoded backstage to hide the payload, download subsequent scripts and modify the system settings to remove the Quarantine tag, thus successfully avoiding the macOS built-in security check. The payload of the implanted system was identified as the "Infostealer" malicious software. Unlike the virus of the traditional destruction system, the malicious software focuses on the silent theft of high-value data, including browser Cookie, active login session, auto-filling password, SSH key and developer API tokens。
❯
Search
Scan to open current page
Top
Checking in, please wait
Click for today's check-in bonus!
You have earned {{mission.data.mission.credit}} points today!
My Coupons
-
¥CouponsLimitation of useExpired and UnavailableLimitation of use
before
Limitation of usePermanently validCoupon ID:×Available for the following products: Available for the following products categories: Unrestricted use:Available for all products and product types
No coupons available!
Unverify
Daily tasks completed:
