Malicious OpenClaw Skills Deploy Atomic macOS Stealer Through Fake Driver Prompts


Threat actors embedded AMOS stealer in 39 malicious OpenClaw skills across ClawHub, SkillsMP, GitHub. SKILL.md files trick AI agents into prompting manual OpenClawCLI driver installs. Fake password dialogs capture system credentials for full macOS compromise.

AMOS malware-as-a-service targets Apple credentials, browser data, crypto wallets, Telegram chats. Universal Mach-O binary runs on Intel and Apple Silicon Macs. Over 2,200 malicious skills discovered on GitHub repositories alone.

Attack chain starts with innocent-looking SKILL.md instruction. GPT-4o models prompt users to install fake OpenClawCLI from openclawcli.vercel.app. Claude Opus 4.5 flags malicious intent refusing execution.

Base64 payload drops unsigned binary triggering fake macOS password dialog. User-entered system password grants full persistence and data access. Single click compromises entire machine.

GPT-4o constantly reminding the user to manually install the malicious ‘driver’ (Source – Trend Micro)

Once authenticated, AMOS enumerates 19 browsers for cookies, passwords, credit cards. 150 cryptocurrency wallets targeted alongside Apple Keychain, Notes, VPN profiles. Desktop, Documents, Downloads folders yield PDFs, CSVs, password databases.

ZIP archive compresses loot for socifiapp.com exfiltration. Campaign represents AI agent supply chain compromise evolution. Malicious skills bypass traditional cracked app delivery.

Claude-4.5-Opus identifies the skill as malicious (Source – Trend Micro)

Developers face risks installing unverified OpenClaw extensions. Enterprise macOS deployments require skill allowlisting immediately. AI workflow isolation prevents automatic propagation.

Data Theft Targets Table

CategorySpecific Targets
Browsers19 apps cookies/passwords/cards
Crypto150 wallet applications
AppleKeychain, Notes, VPN profiles
FilesDesktop/Documents/Downloads
MessagingTelegram desktop chats
FormatsPDF, CSV, KDBX, DOCX

Infection Indicators

TypeIndicator
Fake Siteopenclawcli.vercel.app
C2 Serversocifiapp.com
Payload IP91.92.242.30
Download/ece0f208u7uqhs6x
Binaryil24xgriequcys45
DetectionTrojan.MacOS.Amos
Fake dialogue box asking users for their password (Source – Trend Micro)

Containerized AI execution blocks privilege escalation attempts. Unsigned binary rejection training prevents dialog falls.

Protection Steps

  • Verify OpenClaw skills before installation
  • Test skills in isolated macOS containers
  • Block openclawcli.vercel.app domains
  • Disable AI agent external installs
  • Monitor socifiapp.com connections
  • Audit Mach-O binary signatures
  • Deploy AMOS behavioral detection
AMOS Stealer process accessing sensitive data on the affected macOS system (Source – Trend Micro)

macOS enterprise deployments require immediate skill repository scanning. MaaS operators evolve delivery exploiting AI extension trust. Rapid takedown lags behind repository proliferation.

FAQ

How many malicious OpenClaw skills discovered?

39 uploaded plus 2,200 additional GitHub variants.

Which AI models fall for fake driver prompts?

GPT-4o prompts installation; Claude Opus 4.5 flags malicious.

What triggers fake macOS password dialog?

Unsigned Mach-O binary execution post-Base64 decode.

Primary AMOS data targets on macOS?

Browsers, crypto wallets, Apple Keychain, documents.

C2 exfiltration endpoint used?

socifiapp.com receives ZIP compressed victim data.

Persistence method after password capture?

Full system access via legitimate user credentials.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages