Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware
    Cybersecurity

    Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware

    adminBy adminMarch 6, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    OpenClaw
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware

    Fake OpenClaw installers hosted in GitHub repositories and promoted by Microsoft Bing’s AI-enhanced search feature instructed users to run commands that deployed information stealers and proxy malware.

    OpenClaw is an open-source AI agent that gained popularity as a personal assistant capable of executing tasks. It has access to local files and can integrate with email, messaging apps, and online services.

    Due to its widespread local access, threat actors saw an opportunity to collect sensitive information by publishing malicious skills (instruction files) on the tool’s official registry and GitHub.

    Researchers at managed detection and response company Huntress discovered a new campaign last month that spread multiple executables for malware loaders and infostealers to users looking to install OpenClaw.

    According to the researchers, the threat actor set up malicious GitHub repositories posing as OpenClaw installers, which were recommended by Bing in its AI-powered search results for the Windows version of the tool.

    Malicious Bing AI Search results
    Malicious Bing AI Search results
    Source: Huntress

    Bing AI’s suggested download link in the image above points to a malicious OpenClaw installer on GitHub, Huntress researchers said in a report.

    The researchers say that “just hosting the malware on GitHub was enough to poison Bing AI search results.”

    A fake OpenClaw repository that Huntress analyzed appeared legitimate at a quick look, as the threat actor tied it to a GitHub organization named openclaw-installer. This may also have carried some weight in Bing’s AI recommendation.

    The GitHub accounts publishing these repositories were newly created, but attempted to increase their legitimacy by copying real code from the Cloudflare moltworker project.

    Example of a malicious GitHub repository
    Example of a malicious GitHub repository
    Source: Huntress

    However, the repository provided an installation guide for OpenClaw on macOS, instructing the user to paste a bash command in Terminal. This would reach a separate GitHub organization called puppeteerrr and a repository named dmg.

    “The repository contained a number of files that followed a theme of containing a shell script paired with a Mach-O executable,” which Huntress identified as the Atomic Stealer malware.

    Malicious OpenClaw installation instructions for macOS users
    Malicious OpenClaw installation instructions for macOS users
    S​​​​​source: Huntress

    For Windows users, the threat actor used the fake repositories to deliver OpenClaw_x64.exe, which deployed multiple malicious executables. Huntress says that the Windows Managed AV and Managed Defender for Endpoint solutions quarantined the files on the customer’s machine that they analyzed.

    Most of the executables were Rust-based malware loaders that executed information stealers in memory, the researchers said, adding that one of the payloads was Vidar stealer that contacted Telegram and Steam user profiles to get command-and-control (C2) data.

    Another Windows executable delivered this way was the GhostSocks backconnect proxy malware, designed to convert users’ machines into a proxy node.

    An attacker can use the system to access accounts with credentials stolen from the machine, thus bypassing anti-fraud checks. Threat actors also use proxy nodes to route malicious traffic or to hide their tracks in attacks.

    While investigating, Huntress identified multiple accounts and repositories used in the same campaign, which delivered malware to users seeking OpenClaw installers.

    All of the malicious repositories have been reported to GitHub, though it’s unclear if they have been removed by now.

    The official OpenClaw repository on GitHub is here. It is recommended to bookmark the official portals of the software you’re using instead of searching online each time.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

    Bing Fake GitHub infostealing Malware OpenClaw promoted pushing repo
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow to chunk content and when it’s worth it
    Next Article Samsung Galaxy S26 devices still come with a free gift card!
    admin
    • Website

    Related Posts

    Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

    April 25, 2026

    Compromised everyday devices power Chinese cyber espionage operations

    April 25, 2026

    Windows Update gets new controls to reduce forced restarts

    April 25, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Why GEO is a reputation problem

    April 25, 2026

    Your SSD is slowing down, and Windows has been quietly hiding the fix

    April 25, 2026

    Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

    April 25, 2026

    Google Clock 8.8 APK Download by Google LLC

    April 25, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,505)
    • Privacy & Online Earning (183)
    • SEO & Digital Marketing (924)
    • Tech Tools & Mobile / Apps (1,789)
    • WiFi / Internet & Networking (246)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Why GEO is a reputation problem

    April 25, 2026

    Your SSD is slowing down, and Windows has been quietly hiding the fix

    April 25, 2026

    Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

    April 25, 2026
    Most Popular
    • Why GEO is a reputation problem
    • Your SSD is slowing down, and Windows has been quietly hiding the fix
    • Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software
    • Google Clock 8.8 APK Download by Google LLC
    • Compromised everyday devices power Chinese cyber espionage operations
    • Why Great Content Is No Longer Enough & What Beats It In AI Search
    • Windows Update gets new controls to reduce forced restarts
    • Melitta AromaFresh Therm Pro review: an almost-great drip coffee maker that’s let down by its most novel feature
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.