Infostealer malware caught stealing OpenClaw secrets, marking new era in AI agent threats

Reviewed byNidhi Govil

2 Sources

Share

Hudson Rock documented the first case of infostealer malware exfiltrating OpenClaw data, including API keys and authentication tokens. The Vidar variant stole AI agent configuration files on February 13, 2026, marking a shift in cybercrime targets from browser credentials to compromising personal AI agents and their digital identities.

Infostealer Malware Targets OpenClaw for the First Time

Cybersecurity researchers at Hudson Rock have documented the first in-the-wild instance of infostealer malware successfully exfiltrating OpenClaw configuration files containing sensitive authentication secrets. The incident, which occurred on February 13, 2026, marks what researchers describe as "a significant milestone in the evolution of infostealer behavior: the transition from stealing browser credentials to harvesting the 'souls' and identities of personal AI agents."

1

OpenClaw, formerly known as ClawdBot and MoltBot, is a local-running AI agent framework that maintains a persistent configuration and memory environment on users' machines. The tool can access local files, log in to email and communication apps, and interact with online services. Since its November 2025 debut, OpenClaw has seen massive adoption worldwide, accumulating more than 200,000 stars on GitHub.

2

Source: BleepingComputer

Source: BleepingComputer

How the Vidar Infostealer Captured AI Agent Configuration Files

Alon Gal, co-founder and CTO of Hudson Rock, identified the threat as likely a variant of the Vidar infostealer, an off-the-shelf malware active since late 2018. The malware doesn't specifically target OpenClaw through custom modules. Instead, it executes a broad file-stealing routine that scans for sensitive files and directories containing keywords like "token" and "private key." Because files in the ".openclaw" configuration directory contained these keywords, they were captured during the infection.

1

The stolen data includes critical AI agent configuration files that contain API keys, authentication tokens, and gateway credentials. Hudson Rock's AI analysis tool concluded that the stolen API keys and tokens are sufficient to potentially enable a full compromise of the victim's digital identity. The theft of gateway authentication tokens is particularly concerning, as it can allow threat actors to connect to the victim's local OpenClaw instance remotely if the port is exposed, or masquerade as the client in authenticated requests to the AI gateway.

2

Source: Hacker News

Source: Hacker News

A Shift in Cybercrime Targets from Browsers to AI Agents

Hudson Rock had predicted this development since late last month, calling OpenClaw "the new primary target for infostealers" due to the highly sensitive data these AI agents handle and their relatively lax security posture. "While the malware may have been looking for standard 'secrets,' it inadvertently struck gold by capturing the entire operational context of the user's AI assistant," the researchers noted.

2

The researchers expect information stealers to continue focusing on stealing OpenClaw secrets as the tool becomes increasingly integrated into professional workflows. They anticipate that infostealer developers will likely release dedicated modules specifically designed to decrypt and parse these files, similar to existing modules for Chrome or Telegram. This represents a fundamental shift in cybercrime targets, moving from traditional browser-based credential theft to compromising personal AI agents.

1

Broader Security Concerns for OpenClaw Users

The infostealer incident is not the only cybersecurity challenge facing OpenClaw users. SecurityScorecard's STRIKE Threat Intelligence team discovered hundreds of thousands of exposed OpenClaw instances, potentially exposing users to remote code execution risks. When OpenClaw runs with permissions to email, APIs, cloud services, or internal resources, an RCE vulnerability can become a pivot point for attackers.

2

Additionally, Tenable discovered a max-severity flaw in nanobot, an ultra-lightweight personal AI assistant inspired by OpenClaw. The vulnerability, tracked as CVE-2026-2577, could allow remote attackers to hijack WhatsApp sessions via exposed instances. The nanobot project, which already has 20,000 stars and over 3,000 forks on GitHub despite being released just two weeks ago, has since released fixes in version 0.13.post7.

1

In response to mounting security concerns, OpenClaw maintainers announced a partnership with VirusTotal to scan for malicious skills uploaded to ClawHub, establish a threat model, and add the ability to audit for potential misconfigurations. On February 15, 2026, OpenAI CEO Sam Altman announced that OpenClaw's founder, Peter Steinberger, would be joining OpenAI, with OpenClaw continuing as an open source project under a foundation that OpenAI will support.

2

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo