Bing AI search results poisoned, malicious OpenClaw installer stealing confidential information

MarketWhisper

Bing AI search results poisoned

SlowMist Chief Information Security Officer 23pds posted on the X platform on March 10th warning that attackers have carried out “poisoning” attacks on Bing AI search results, pushing fake OpenClaw installers to the top of search results for “OpenClaw Windows,” tricking users into downloading and executing malicious programs.

Attack Method: How Malicious Repositories on GitHub Pollute Bing AI Search

OpenClaw star history
(Source: Huntress)

OpenClaw is a rapidly growing open-source AI assistant tool with a large user base, originally named Clawdbot (launched November 2025), which quickly gained tens of thousands of forks and hundreds of thousands of stars on GitHub. Its popularity has become an entry point for attackers.

Attackers created malicious repositories on GitHub disguised as legitimate installers, using legitimate code from Cloudflare to increase credibility, and published under the independent GitHub organization name “openclaw-installer,” rather than a regular user account, further avoiding initial suspicion.

Huntress points out that the success of this attack hinges on: simply hosting malicious code on GitHub is enough to pollute Bing AI search recommendations, without any additional manipulation of search engine algorithms. This method is a continuation of the December 2025 attack where attackers exploited ChatGPT and Grok shared chat features, but with lower barriers and broader impact.

Malicious Toolkit Analysis: Three-Layer Malicious Software Threat

The malicious components deployed in this attack are clearly divided:

Stealth Packer (New Type of Packager): Injects malicious code into memory, adds firewall rules, creates hidden ghost scheduled tasks, and performs anti-virtual machine checks (detects mouse movement to determine if in a real environment). Detected very rarely on VirusTotal.

GhostSocks (Reverse Proxy Malware): Previously used by the BlackBasta ransomware group, turns infected computers into proxy servers, allowing attackers to log in with the victim’s IP address, bypassing multi-factor authentication (MFA) and anti-fraud detection mechanisms.

Information Stealer (Vidar / PureLogs Stealer): Written in Rust, runs as a loader in memory, stealing credentials, API keys, and OpenClaw configuration files; variants of Vidar even use Telegram channels and Steam user pages to hide dynamic C2 command addresses.

Cross-Platform Infection: Different Invasion Paths for Windows and macOS

Malicious GitHub repositories provide installation instructions for both platforms. On Windows, executing “OpenClaw_x64.exe” deploys multiple Rust-based malicious loaders, with information stealers quietly running in memory. On macOS, the installation guide requires running a one-line bash command to pull “OpenClawBot” from another malicious organization’s “dmg” repository, confirmed as a variant of AMOS, which disguises itself as an administrator permission request to steal sensitive data from folders like Documents, Downloads, and Desktop.

After Huntress discovered and reported the malicious repositories to GitHub, they were closed within about 8 hours. Notably, even legitimate versions of OpenClaw contain configuration files with highly sensitive information (passwords, API keys, etc.). If the system has been compromised by the info-stealing malware, these files are also at risk of theft.

Frequently Asked Questions

Q: Why are malicious programs recommended in Bing AI search results?
Attackers found that hosting malicious code on GitHub is enough for Bing AI’s recommendation system to push malicious repositories to the top. The AI system’s evaluation of GitHub repository trustworthiness fails to effectively identify malicious content, allowing attackers to exploit the platform’s inherent trust to deceive.

Q: How does GhostSocks malware bypass multi-factor authentication?
GhostSocks turns the infected computer into a proxy server, enabling attackers to log into compromised accounts using the victim’s IP address. Since login behavior appears consistent with the victim’s usual location and network environment, MFA and anti-fraud mechanisms have difficulty detecting these as abnormal accesses.

Q: How to identify fake OpenClaw installers?
Legitimate OpenClaw should be downloaded directly from the official GitHub repository. For macOS installation, if prompted to run a bash one-liner from an unknown organization’s repository, it should be considered highly dangerous. Users should not blindly trust code repositories on GitHub—hosting on a trusted platform does not guarantee the software’s safety.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Kelp DAO Bridge Exploit Results in $293M Mint, Leaves Aave With Over $200M in Bad Debt

An attacker exploited a vulnerability in Kelp DAO's cross-chain bridge, stealing $293 million in unbacked rsETH. The incident caused significant losses for DeFi platforms, with Aave facing up to $236 million in bad debt and substantial impacts on the market.

GateNews1h ago

Expert Claims Altcoin Metrics Are Being 'Gamed' to Mislead Investors

Crypto researcher Orbion raises concerns over the possible manipulation of key market indicators, including the Altseason Index and Crypto Fear and Greed Index, suggesting that inflated metrics create false optimism and mislead investors about the onset of altcoin season.

Coinpedia4h ago

Curve Finance Suspends LayerZero Infrastructure Following rsETH Hack

Curve Finance has temporarily suspended its LayerZero infrastructure due to a security incident involving rsETH. The protocol is investigating the issue, affecting certain cross-chain bridging operations while others continue as normal.

GateNews6h ago

KelpDAO Exploiter Borrows $195M ETH from Aave, TVL Drops $6.28B as Whales Withdraw

Gate News message, the KelpDAO exploiter borrowed over 82,600 ETH ($195M) from Aave using RSETH as collateral, resulting in bad debt appearing on Aave. Following this incident, numerous whales withdrew funds from Aave, causing its TVL to decline from $26.396B to $20.114B, a decrease of $6.28B.

GateNews9h ago

Monad Co-Founder Suggests Dynamic Caps on Collateral Deposits to Mitigate Hacking Risks

Keone Hon suggests that pooled lending protocols should implement gradual rate limits on collateral asset increases to mitigate risks during hacks. He argues this could have prevented significant losses, as seen with rsETH depositors.

GateNews12h ago

Hong Kong Police Warn of 'AI Quantitative Trading' Crypto Scam, Woman Loses HK$7.7 Million

Hong Kong police revealed a cryptocurrency fraud where a woman lost HK$7.7 million to scammers posing as investment experts via Telegram, promising high returns through AI trading. The police warned the public of the risks associated with cryptocurrency investments.

GateNews12h ago
Comment
0/400
No comments