Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens
    Cybersecurity

    Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

    adminBy adminFebruary 16, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananFeb 16, 2026Artificial Intelligence / Threat Intelligence

    Cybersecurity researchers disclosed they have detected a case of an information stealer infection successfully exfiltrating a victim’s OpenClaw (formerly Clawdbot and Moltbot) configuration environment.

    “This finding marks a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the ‘souls’ and identities of personal AI [artificial intelligence] agents,” Hudson Rock said.

    Alon Gal, CTO of Hudson Rock, told The Hacker News that the stealer was likely a variant of Vidar based on the infection details. Vidar is an off-the-shelf information stealer that’s known to be active since late 2018.

    That said, the cybersecurity company said the data capture was not facilitated by a custom OpenClaw module within the stealer malware, but rather through a “broad file-grabbing routine” that’s designed to look for certain file extensions and specific directory names containing sensitive data.

    This included the following files –

    • openclaw.json, which contains details related to the OpenClaw gateway token, along with the victim’s redacted email address and workspace path.
    • device.json, which contains cryptographic keys for secure pairing and signing operations within the OpenClaw ecosystem.
    • soul.md, which contains details of the agent’s core operational principles, behavioral guidelines, and ethical boundaries.

    It’s worth noting that the theft of the gateway authentication token can allow an attacker to connect to the victim’s local OpenClaw instance remotely if the port is exposed, or even masquerade as the client in authenticated requests to the AI gateway.

    “While the malware may have been looking for standard ‘secrets,’ it inadvertently struck gold by capturing the entire operational context of the user’s AI assistant,” Hudson Rock added. “As AI agents like OpenClaw become more integrated into professional workflows, infostealer developers will likely release dedicated modules specifically designed to decrypt and parse these files, much like they do for Chrome or Telegram today.”

    The disclosure comes as security issues with OpenClaw prompted the maintainers of the open-source agentic platform to announce a partnership with VirusTotal to scan for malicious skills uploaded to ClawHub, establish a threat model, and add the ability to audit for potential misconfigurations.

    Last week, the OpenSourceMalware team detailed an ongoing ClawHub malicious skills campaign that uses a new technique to bypass VirusTotal scanning by hosting the malware on lookalike OpenClaw websites and using the skills purely as decoys, instead of embedding the payload directly in their SKILL.md files.

    “The shift from embedded payloads to external malware hosting shows threat actors adapting to detection capabilities,” security researcher Paul McCarty said. “As AI skill registries grow, they become increasingly attractive targets for supply chain attacks.”

    Another security problem highlighted by OX Security concerns Moltbook, a Reddit-like internet forum designed exclusively for artificial intelligence agents, mainly those running on OpenClaw. The research found that an AI Agent account, once created on Moltbook, cannot be deleted. This means that users who wish to delete the accounts and remove the associated data have no recourse.

    What’s more, an analysis published by SecurityScorecard’s STRIKE Threat Intelligence team has also found hundreds of thousands of exposed OpenClaw instances, likely exposing users to remote code execution (RCE) risks.

    Fake OpenClaw Website Serving Malware

    “RCE vulnerabilities allow an attacker to send a malicious request to a service and execute arbitrary code on the underlying system,” the cybersecurity company said. “When OpenClaw runs with permissions to email, APIs, cloud services, or internal resources, an RCE vulnerability can become a pivot point. A bad actor does not need to break into multiple systems. They need one exposed service that already has authority to act.”

    OpenClaw has had a viral surge in interest since it first debuted in November 2025. As of writing, the open-source project has more than 200,000 stars on GitHub. On February 15, 2026, OpenAI CEO Sam Altman said OpenClaw’s founder, Peter Steinberger, would be joining the AI company, adding, “OpenClaw will live in a foundation as an open source project that OpenAI will continue to support.”

    Agent Configuration Files Gateway Infostealer OpenClaw Steals Tokens
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow the Pros Predict Marketing Will Change in 2026
    Next Article Crunchyroll: Anime Streaming 3.99.3 by Crunchyroll, LLC
    admin
    • Website

    Related Posts

    The vulnerability that turns your AI agent against you

    March 4, 2026

    Paint maker giant AkzoNobel confirms cyberattack on U.S. site

    March 4, 2026

    VMware Aria Operations Vulnerability Exploited in the Wild

    March 4, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    How to Focus on Topics (Not Keywords) in Your SEO Strategy

    March 4, 2026

    The Galaxy S26 Ultra makes it clear this feature isn’t coming back

    March 4, 2026

    The vulnerability that turns your AI agent against you

    March 4, 2026

    Seraphinite Accelerator WordPress Plugin Vulnerabilities Affect 60K Sites

    March 4, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (594)
    • Privacy & Online Earning (88)
    • SEO & Digital Marketing (374)
    • Tech Tools & Mobile / Apps (730)
    • WiFi / Internet & Networking (106)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    How to Focus on Topics (Not Keywords) in Your SEO Strategy

    March 4, 2026

    The Galaxy S26 Ultra makes it clear this feature isn’t coming back

    March 4, 2026

    The vulnerability that turns your AI agent against you

    March 4, 2026
    Most Popular
    • How to Focus on Topics (Not Keywords) in Your SEO Strategy
    • The Galaxy S26 Ultra makes it clear this feature isn’t coming back
    • The vulnerability that turns your AI agent against you
    • Seraphinite Accelerator WordPress Plugin Vulnerabilities Affect 60K Sites
    • Oukitel WP63 is a phone I would stock for the apocalypse
    • Paint maker giant AkzoNobel confirms cyberattack on U.S. site
    • Apple March Event Live Blog: MacBook Neo, iPhone 17e, M5 Macs, and More
    • VMware Aria Operations Vulnerability Exploited in the Wild
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.