top of page

ClawHavoc: The AI Agent Supply Chain Attack You Need to Know About

  • Writer: Patrick Duggan
    Patrick Duggan
  • Feb 13
  • 3 min read

# ClawHavoc: The AI Agent Supply Chain Attack You Need to Know About


**Published:** February 14, 2026




The Attack



Between January 27-29, 2026, threat actors uploaded **341 malicious skills** to ClawHub, the community marketplace for OpenClaw AI agents.


**9,000+ installations compromised in 72 hours.**


The payload? **AMOS (Atomic Stealer)** - an information-stealing malware targeting macOS and Windows that harvests:

- Crypto wallet private keys

- Browser passwords

- SSH credentials

- API keys

- Session tokens


The attack vector is elegant and terrifying: users install what looks like a legitimate skill - maybe `solana-wallet-tracker` or `youtube-summarize-pro`. The skill's documentation looks professional. But there's a "Prerequisites" section that instructs users to run a terminal command to "fix the environment."


That command installs AMOS.




The Infrastructure



**C2 Server:** `91.92.242.30`


| Detail | Value |

|--------|-------|

| ASN | AS202412 |

| Provider | Omegatech LTD |

| Registration | Seychelles (bulletproof hosting) |

| VirusTotal | 22/93 malicious |

| Spamhaus | DROP listed (SBL686267) |


The parent network `91.92.240.0/22` is **already in our STIX feed** via Spamhaus DROP integration.




The Threat Actors



| Account | Created | Activity |

|---------|---------|----------|

| `hightower6eu` | Jan 20, 2026 | **354 malicious packages** (repos now deleted) |

| `davidsmorais` | Oct 2016 | Compromised legit account - mixed clean/malicious uploads |


Koi Security identified 14 accounts contributing malicious content. The pattern suggests both fresh throwaway accounts AND compromised legitimate accounts from years ago.




CVE-2026-25253: The 1-Click RCE



Even if you avoided ClawHub entirely, OpenClaw had a critical vulnerability:


**CVE-2026-25253** - Incorrect Resource Transfer Between Spheres

- **CVSS:** 8.8 (High)

- **Exposed instances:** 17,500+

- **Attack:** Malicious link with `?gatewayUrl=attacker.com/ws` forces token exfiltration

- **Impact:** Full RCE on victim's machine


The vulnerability exploits a logic flaw where OpenClaw accepts a gateway URL via query string and establishes a WebSocket connection WITHOUT user confirmation, transmitting authentication credentials.


**Even localhost users are vulnerable** - the attack uses the victim's browser to pivot into the local network.


Patched in v2026.1.29 (February 3, 2026).




What We're Blocking Right Now



Our STIX feed currently contains **1,251 indicators** from the last 24 hours:


| Malware Family | Active C2s | Threat Type |

|----------------|-----------|-------------|

| Cobalt Strike | 29 | Post-exploitation framework |

| Meterpreter | 2 | Remote access |

| Latrodectus | 1 | Loader malware |

| BianLian | 1 | Ransomware |

| Adaptix C2 | Active | Command & control |

| VShell | Active | Backdoor |

| LokiPWS | Active | Password stealer |


Plus:

- **Spamhaus DROP/EDROP** - Hijacked networks (including the ClawHavoc ASN)

- **ThreatFox** - Certificate anomaly detection

- **OTX Integration** - Community pulses

- **Zero-abuse "ghosts"** - Threats we catch that nobody else sees




The Bigger Picture



This week's threat landscape:


| Threat | Status | Our Coverage |

|--------|--------|--------------|

| ClawHavoc (AI Agents) | Active | ASN blocked via Spamhaus |

| Notepad++ Supply Chain | Active | 29 Cobalt Strike C2s |

| Microsoft 6 Zero-Days | Patch Tuesday | Ransomware IOCs |

| CVE-2026-25253 (OpenClaw) | Patched | Infrastructure blocked |

| Ivanti EPMM RCE | Active | IOCs indexed |


The theme is clear: **supply chain attacks are the #1 vector in 2026.**


Your text editor might be compromised (Notepad++). Your AI agent plugins might be compromised (OpenClaw). Your CI/CD dependencies might be compromised (the npm/PyPI attacks continue).




Get On The Feed



**STIX 2.1 Feed (Free):**




**Parameters:**

- `?days=7` - Last 7 days

- `?days=30` - Last 30 days

- `?malware=cobalt_strike` - Filter by family


**Who's Already Using It:**

- Microsoft

- AT&T

- Google

- Lumen


**What You Get:**

- 1,000+ indicators daily

- Cobalt Strike, Meterpreter, AMOS, Latrodectus coverage

- Spamhaus DROP/EDROP (bulletproof hosting networks)

- ThreatFox certificate anomalies

- MITRE ATT&CK mapping




Recommendations



1. **If you use OpenClaw:** Update to v2026.1.29+ immediately. Rotate all tokens. Audit installed skills.


2. **If you use Notepad++:** Check for compromise indicators. Our Cobalt Strike C2 list covers the payload infrastructure.


3. **If you run AI agents:** Treat skills/plugins like npm packages - verify publishers, check for typosquatting, sandbox execution.


4. **For everyone:** Get on the feed. Block the beacons.




Sources



- [The Hacker News: 341 Malicious ClawHub Skills](https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html)

- [VirusTotal Blog: OpenClaw Weaponization](https://blog.virustotal.com/2026/02/from-automation-to-infection-how.html)

- [SOCRadar: CVE-2026-25253](https://socradar.io/blog/cve-2026-25253-rce-openclaw-auth-token/)

- [Snyk: SKILL.md to Shell Access](https://snyk.io/articles/skill-md-shell-access/)

- [Bitdefender: OpenClaw Enterprise Exploitation](https://businessinsights.bitdefender.com/technical-advisory-openclaw-exploitation-enterprise-networks)

- [Koi Security: ClawHavoc Analysis](https://www.koi.ai/blog/clawhavoc-341-malicious-clawedbot-skills-found-by-the-bot-they-were-targeting)




*The AI agent era has its first major supply chain attack. 9,000 compromised in 72 hours. The infrastructure is in our feed. Block it.*





*Her name was Renee Nicole Good.*


*His name was Alex Jeffery Pretti.*

 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page