Back to News
malware🌐InternationalBleepingComputer

Infostealers Target OpenClaw AI Assistant Secrets for Digital Identity Theft

Monday, February 16, 2026

Infostealers Target OpenClaw AI Assistant Secrets for Digital Identity Theft

What

Information-stealing malware is now exfiltrating critical data from OpenClaw AI assistant installations, including authentication tokens and private keys. This development marks a significant shift in infostealer behavior, moving beyond browser credentials to target personal AI agent identities.

Where

OpenClaw AI assistant users worldwide; also, Nanobot users affected by a separate vulnerability.

When

First OpenClaw data theft detected on February 13, 2026. Nanobot vulnerability fixes released recently.

Key Factors

  • The infostealer, believed to be a Vidar variant, employs a broad file-stealing routine that targets keywords like "token" and "private key" found within OpenClaw's configuration directory.
  • Stolen files include `openclaw.json`, `device.json`, `soul.md`, and memory files, containing gateway authentication tokens, public/private keys for device pairing, and persistent contextual data like daily activity logs and private messages.
  • Compromise of these files could enable remote connection to local OpenClaw instances, client impersonation, bypassing "Safe Device" checks, and access to encrypted logs or paired cloud services.

Takeaways

  • Users of OpenClaw and similar local AI agents should implement robust endpoint security solutions and regularly review access permissions for AI-related directories.
  • This incident highlights the growing risk to digital identities stored within AI assistant frameworks, necessitating enhanced security postures for agentic AI tools.
Read Full Article

Opens original article on BleepingComputer

Similar News