Bing AI pointed users to fake OpenClaw GitHub repos that installed info-stealing malware


Users searching for OpenClaw on Bing could be steered to fake GitHub repositories that delivered malware instead of the AI tool they expected. Huntress says one victim searched for “OpenClaw Windows” through Bing and clicked an AI-generated suggestion that linked straight to a newly created malicious GitHub repo posing as an OpenClaw installer.

The campaign matters because OpenClaw is a local-first AI assistant with broad access to files, apps, and services. That makes it a strong lure for attackers, especially when users expect installers, scripts, and integrations to be part of the normal setup experience. Huntress says the fake repos were live between February 2 and February 10, 2026, and GitHub removed them after the company reported the abuse.

This is not just a GitHub abuse story. It is also a search trust problem. Huntress says the malicious repo showed up as the top-rated AI suggestion in Bing for OpenClaw on Windows, which meant users could land on malware even when they were trying to download a well-known open-source project from a familiar platform.

What happened

Huntress says attackers created fake GitHub repositories that looked like OpenClaw installer pages. One repo used the openclaw-installer name and copied legitimate code from Cloudflare’s moltworker project to appear more believable. According to Huntress, that was enough to poison Bing’s AI-enhanced search suggestions and get the malicious repo surfaced to users looking for OpenClaw installers.

For macOS users, the fake instructions told victims to paste a bash command into Terminal. Huntress says that chain pulled files from a separate GitHub organization and delivered Atomic Stealer. For Windows users, the fake OpenClaw_x64.exe installer dropped several malicious executables, including Rust-based loaders, a Vidar stealer payload, and GhostSocks backconnect proxy malware.

Huntress says its Managed AV and Managed Defender for Endpoint products quarantined the Windows files on one affected machine it investigated. The researchers also say one Vidar sample pulled command-and-control data from Telegram and Steam profiles, which fits a broader trend of commodity stealers hiding infrastructure behind public services.

What the malware did

TargetDelivery methodReported payload
WindowsFake OpenClaw_x64.exe installer from GitHubRust loaders, Vidar stealer, GhostSocks proxy
macOSTerminal command from fake install guideAtomic Stealer
Search pathBing AI-enhanced resultLinked users to malicious GitHub repo

GhostSocks is especially dangerous because it can turn an infected machine into a proxy node. That gives attackers a way to route traffic through the victim’s system, blend in with real residential or business IP space, and potentially bypass fraud checks when they try to reuse stolen credentials. Huntress says the malware in this campaign included exactly that capability.

Malicious Bing AI Search results Source: Huntress

Why OpenClaw is such an attractive lure

OpenClaw’s popularity has exploded, which gives attackers a ready-made brand to abuse. The official OpenClaw GitHub organization has a large follower base, and Reuters recently reported that the project had surpassed 100,000 stars during its rapid rise. That kind of attention makes fake installers and fake registries more convincing, especially for users who are moving quickly and relying on search summaries instead of bookmarked links.

Microsoft’s own security guidance also helps explain why this ecosystem is risky. In a February post about running OpenClaw safely, Microsoft warned that agent “skills” can amount to downloading and running code from the internet, and that malicious code can hide inside those packages or related workflows. That warning now looks especially relevant given how attackers abused GitHub repos and install instructions in this campaign.

Example of a malicious GitHub repository Source: Huntress

The bigger problem for Bing and GitHub

The most striking line from Huntress is that “just hosting the malware on GitHub was enough to poison Bing AI search results.” That points to a broader issue with AI-enhanced search systems that summarize and recommend links without doing enough trust validation on new repositories, installer names, or suspicious organizations.

GitHub responded quickly once Huntress filed reports, according to Huntress and follow-up coverage from The Register. But the incident still shows how fast attackers can exploit the gap between repository creation, AI indexing, and takedown response. A newly created repo with copied code and a believable name was enough to get visibility in a mainstream search experience.

Malicious OpenClaw installation instructions for macOS users S​​​​​ource: Huntress

What users should do

  • Download OpenClaw only from its official GitHub organization or official site.
  • Do not trust AI search suggestions for installers without checking the publisher and repo history.
  • Avoid pasting shell commands from search results into Terminal or PowerShell unless you have verified the source.
  • Check whether a repo is brand new, lightly maintained, or tied to a suspicious organization name.
  • Treat AI-agent “skills,” plugins, and install helpers as executable code, not simple add-ons.

Quick facts

  • Huntress says the fake repos were available from February 2 to February 10, 2026.
  • The malicious repo appeared as a Bing AI suggestion for “OpenClaw Windows.”
  • The fake Windows installer delivered Vidar and GhostSocks-related malware.
  • The fake macOS flow delivered Atomic Stealer.
  • GitHub removed the reported repositories after Huntress escalated them.

FAQ

Did Bing itself host the malware?

No. Huntress says Bing’s AI-enhanced search surfaced a malicious GitHub repository. The malware was hosted through fake GitHub repos, not on Bing itself.

Was the real OpenClaw repo compromised?

The reporting points to fake repos, not a compromise of the official OpenClaw GitHub organization. The official OpenClaw GitHub presence remains separate.

What malware was delivered?

Huntress says the Windows chain delivered Rust-based loaders, Vidar stealer, and GhostSocks proxy malware. The macOS chain delivered Atomic Stealer.

Why is GhostSocks a problem?

Huntress says GhostSocks can turn an infected machine into a proxy node, which attackers can use to route traffic or help evade fraud controls.

How can users stay safe?

Use the official OpenClaw repo or website, verify the publisher, inspect repo age and commit history, and avoid copying install commands from AI search results.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages