Critical Alert: Malicious npm Package `@openclaw-ai/openclawai` Deploys RAT, Targets macOS Credentials

Xin lỗi, nội dung trên trang này không có sẵn bằng ngôn ngữ bạn đã chọn

Critical Alert: Malicious npm Package `@openclaw-ai/openclawai` Deploys RAT, Targets macOS Credentials

Preview image for a blog post

Cybersecurity researchers have uncovered a significant threat lurking within the npm registry: a malicious package named @openclaw-ai/openclawai. This library, masquerading as an installer for the legitimate OpenClaw project, is engineered to deploy a sophisticated Remote Access Trojan (RAT) and exfiltrate highly sensitive data, specifically targeting macOS credentials. The discovery underscores the persistent and evolving risks within the open-source software supply chain, posing a direct threat to developers and organizations utilizing npm dependencies.

Anatomy of a Supply Chain Attack: The `@openclaw-ai/openclawai` Deception

The malicious package was uploaded to the npm registry by a user identified as "openclaw-ai" on March 3, 2026. Despite its recent upload, it has already amassed 178 downloads, indicating a concerning level of exposure. The package remains publicly accessible, representing an ongoing risk. The threat actor leveraged a common tactic: typosquatting and brand impersonation, aiming to trick developers into installing a seemingly legitimate, AI-related utility.

Infection Chain and Execution Modus Operandi

The infection typically begins when a developer, either through misidentification, social engineering, or automated dependency resolution, installs the malicious package. Upon installation, the package's postinstall script is automatically executed. This script is the primary vector for the initial compromise. It is designed to:

  1. Download Stage 1 Payload: Fetch an obfuscated shell script or a compiled binary from a remote Command and Control (C2) server.
  2. Establish Persistence: Utilize macOS-specific mechanisms, such as launch agents (LaunchAgents directory), cron jobs, or even modifying system binaries, to ensure the RAT survives reboots and maintains a persistent foothold.
  3. Deploy the RAT: Execute the main RAT payload, which then begins its reconnaissance and data exfiltration operations.

The use of a multi-stage payload delivery helps evade static analysis and adds complexity to incident response efforts, making it harder to trace the initial compromise vector.

Deep Dive into the Malicious Payload: RAT Capabilities and Credential Exfiltration

The RAT deployed by @openclaw-ai/openclawai is highly capable, designed for extensive system control and data theft:

Evasion Techniques and Obfuscation

To circumvent detection by security tools, the malicious package and its subsequent payloads employ several evasion techniques:

Digital Forensics, Incident Response, and Threat Intelligence

Effective response to such a compromise requires a multi-faceted approach, focusing on detection, containment, eradication, and recovery.

Proactive Defense: Securing Your Software Supply Chain

Preventing such attacks requires a robust security posture across the entire software development lifecycle:

Conclusion: Vigilance is Paramount

The discovery of @openclaw-ai/openclawai serves as a stark reminder of the continuous threats targeting the open-source ecosystem. The sophisticated nature of this attack, combining social engineering with advanced RAT capabilities and targeted credential theft, necessitates immediate attention from developers, security teams, and organizations. Maintaining vigilance, implementing robust security practices, and fostering a culture of security awareness are paramount to defending against these evolving supply chain attacks. Continuous monitoring and proactive threat intelligence are no longer optional but essential components of modern cybersecurity.

X
Để mang đến cho bạn trải nghiệm tốt nhất, https://iplogger.org sử dụng cookie. Việc sử dụng cookie có nghĩa là bạn đồng ý với việc chúng tôi sử dụng cookie. Chúng tôi đã công bố chính sách cookie mới, bạn nên đọc để biết thêm thông tin về các cookie mà chúng tôi sử dụng. Xem Chính sách cookie