Malware-Laced OpenClaw Installers Boosted by Bing AI Search Results
Security researchers at Huntress identified malicious GitHub repositories containing OpenClaw installers laced with information-stealing malware and GhostSocks, which were being promoted through manipulated Bing AI search results, The Register reported on March 5, 2026. The campaign exploits Bing's AI-enhanced search to push malicious results above legitimate software downloads, targeting developers and users searching for the OpenClaw AI agent tool. The discovery is particularly notable because the same OpenClaw tool was central to the Clinejection supply chain attack in February 2026, suggesting the threat actor may be broadening the distribution vector beyond npm-based delivery.
Key Takeaways
- Huntress researchers Jai Minton and Ryan Dowd found malicious GitHub repos distributing OpenClaw with embedded infostealers and GhostSocks malware — boosted by Bing AI search results
- Campaign exploits Bing AI search result promotion to surface malicious OpenClaw downloads above legitimate sources; targets developers and technical users actively searching for the tool
- OpenClaw was previously identified as the malicious payload in the Clinejection npm supply chain attack (February 2026); this Bing AI campaign appears to be a parallel distribution vector
Original source: The Register