Malicious MoltBot skills used to push password-stealing malware

BleepingComputer
Actively Exploited

Overview

In a troubling development, researchers have discovered over 230 malicious packages targeting OpenClaw, an AI assistant tool, within just a week. These packages, found on the tool's official registry and GitHub, are designed to steal user passwords. This situation raises concerns as it affects users of OpenClaw who may inadvertently download these harmful packages, putting their sensitive information at risk. The rapid proliferation of these packages indicates a serious security threat to the AI assistant community. Users are urged to be cautious and verify the legitimacy of any packages before installation.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: OpenClaw (formerly Moltbot and ClawdBot)
  • Action Required: Users should avoid downloading packages from unverified sources and ensure they are using trusted versions of OpenClaw.
  • Timeline: Newly disclosed

Original Article Summary

More than 230 malicious packages for the personal AI assistant OpenClaw (formerly known as Moltbot and ClawdBot) have been published in less than a week on the tool's official registry and on GitHub. [...]

Impact

OpenClaw (formerly Moltbot and ClawdBot)

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Newly disclosed

Remediation

Users should avoid downloading packages from unverified sources and ensure they are using trusted versions of OpenClaw.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Malware.

Related Coverage

Grinex exchange blames "Western intelligence" for $13.7M crypto hack

BleepingComputer

Grinex, a cryptocurrency exchange based in Kyrgyzstan, has halted its operations following a significant hack that resulted in a loss of $13.7 million. The exchange claims that Western intelligence agencies are behind the attack, although specific evidence for this assertion has not been provided. This incident raises concerns about the security of cryptocurrency exchanges, which are often targets for cybercriminals and potentially state-sponsored actors. Users of Grinex are likely affected, facing uncertainty about the recovery of their funds. The incident highlights the ongoing risks in the cryptocurrency space and the need for exchanges to bolster their security measures to protect against such attacks.

Apr 17, 2026

Inside an Underground Guide: How Threat Actors Vet Stolen Credit Card Shops

BleepingComputer

In the world of cybercrime, trust is a key element, especially when it comes to buying stolen credit card information. A recent investigation by Flare reveals that underground guides are teaching cybercriminals how to assess the credibility of carding shops. These guides emphasize evaluating the quality of data, the shop's reputation, and its ability to survive scrutiny from law enforcement. This information is crucial for actors looking to maximize their profits while minimizing the risk of getting caught. The implications are significant, as it reveals the organized nature of these criminal operations and the lengths to which they go to establish trust among themselves, putting consumers at greater risk for fraud and financial loss.

Apr 17, 2026

Commercial AI Models Show Rapid Gains in Vulnerability Research

Infosecurity Magazine

A recent study by Forescout reveals that artificial intelligence models are rapidly advancing in the fields of vulnerability research and exploit development. This progress poses new cybersecurity risks as attackers may increasingly use AI-driven tools to find and exploit vulnerabilities in software and systems. The research indicates that these AI models can automate the discovery of weaknesses, making it easier for malicious actors to launch attacks. As a result, organizations may face heightened threats if they don't stay vigilant and update their defenses. Companies should prioritize investing in cybersecurity measures that can counteract these AI-enabled risks to protect their systems and data.

Apr 17, 2026

Bot traffic makes up 49% of online activity, but 99% of bots unwanted

SCM feed for Latest

A recent study reveals that nearly half of all online activity, about 49%, is generated by bots, with a staggering 99% of those bots being unwanted. Researchers have pointed out that malicious bots often mimic trusted user agents to hide their true purpose, which can lead to various security issues for websites and online services. This kind of activity can skew analytics, facilitate fraud, and potentially compromise sensitive data. Businesses and website owners need to be aware of these threats and implement measures to detect and block these malicious bots effectively. The implications are significant, as the growing prevalence of unwanted bot traffic can harm user experience and undermine trust in online platforms.

Apr 17, 2026

Coast Guard's New Cybersecurity Rules Offers Lessons for CISOs

darkreading

The Coast Guard has introduced new cybersecurity rules as part of the Maritime Transportation Security Act (MTSA), which focuses on securing operational technology (OT) systems. These requirements include the development of protective plans for OT systems, mandatory audits by independent third parties, and the establishment of a hybrid role for OT security. This shift aims to bolster the cybersecurity posture of maritime operations, which have become increasingly vulnerable to cyber threats. Companies operating in the maritime sector need to comply with these regulations to protect their systems and ensure the safety of maritime transportation. The emphasis on independent audits and specialized roles indicates a serious approach to addressing the unique challenges posed by cyber risks in this industry.

Apr 17, 2026

DDoS-For-Hire Services Disrupted by International Police Action in ‘Operation PowerOff’

Infosecurity Magazine

In a significant crackdown on online crime, international law enforcement agencies, including the FBI and Europol, launched ‘Operation PowerOff’ to disrupt DDoS-for-hire services. This operation involved seizing critical infrastructure used by these services and making several arrests. Additionally, authorities sent warning letters to individuals known to have used these DDoS services, signaling a strong stance against such illicit activities. DDoS attacks, which overwhelm websites and networks to render them unusable, have been a growing concern for businesses and organizations worldwide. By targeting these services, law enforcement aims to reduce the frequency of these attacks and deter potential users from engaging with them.

Apr 17, 2026