A new infostealer campaign is targeting OpenClaw users, stealing configuration files and gateway tokens. The attackers use social engineering to trick users into installing malicious software. The stolen data includes API keys, gateway tokens, and other sensitive credentials that grant access to OpenClaw's infrastructure. Once acquired, attackers can use these credentials to perform actions on behalf of the compromised user. Security researchers have identified several indicators of compromise, including unusual network traffic from OpenClaw processes and unexpected modifications to configuration files.

How the Attack Works

The infostealer typically spreads through phishing emails that appear to be from OpenClaw or related services. The malicious attachment contains a trojan that installs itself in the user's system. Once installed, the malware monitors OpenClaw's configuration files and exfiltrates sensitive data to attacker-controlled servers. It uses encrypted channels to avoid detection. Attackers are particularly interested in gateway tokens, which provide administrative-level access to OpenClaw's infrastructure.

What Users Should Do

Verify the authenticity of all communications from OpenClaw. Never download attachments from unsolicited sources. Enable multi-factor authentication for all OpenClaw accounts and gateways. Use unique, strong passwords for each service. Regularly review your OpenClaw configuration files for unexpected modifications. Check network traffic for unusual outbound connections.

The Bottom Line

This attack highlights the importance of security hygiene when working with AI agent platforms. Attackers are increasingly targeting AI tools because they provide access to sensitive systems. OpenClaw users need to be vigilant about phishing and social engineering attacks. Security is everyone's responsibility, not just the platform's. This incident should prompt a security review of all AI agent platforms. The attack surface is growing, and attackers are finding new ways to exploit vulnerabilities.