{"id":232905,"date":"2026-03-10T03:21:09","date_gmt":"2026-03-10T08:21:09","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2026\/03\/malicious-npm-package-posing-as-openclaw-installer-deploys-rat-steals-macos-credentials"},"modified":"2026-03-10T03:21:09","modified_gmt":"2026-03-10T08:21:09","slug":"malicious-npm-package-posing-as-openclaw-installer-deploys-rat-steals-macos-credentials","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2026\/03\/malicious-npm-package-posing-as-openclaw-installer-deploys-rat-steals-macos-credentials","title":{"rendered":"Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/malicious-npm-package-posing-as-openclaw-installer-deploys-rat-steals-macos-credentials2.jpg\"><\/a><\/p>\n<p>Cybersecurity researchers have discovered a malicious npm package that masquerades as an <a href=\"https:\/\/thehackernews.com\/2026\/02\/clawjacked-flaw-lets-malicious-sites.html\" rel=\"noopener\" target=\"_blank\">OpenClaw<\/a> installer to deploy a remote access trojan (RAT) and steal sensitive data from compromised hosts.<\/p>\n<p>The package, named \u201c<a href=\"https:\/\/www.npmjs.com\/package\/@openclaw-ai\/openclawai\" rel=\"noopener\" target=\"_blank\">@openclaw-ai\/openclawai<\/a>,\u201d was uploaded to the registry by a user named \u201copenclaw-ai\u201d on March 3, 2026. It has been downloaded 178 times to date. The library is still available for download as of writing.<\/p>\n<p>JFrog, which discovered the package, said it\u2019s designed to steal system credentials, browser data, crypto wallets, SSH keys, Apple Keychain databases, and iMessage history, as well as install a persistent RAT with remote access capabilities, SOCKS5 proxy, and live browser session cloning.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote access trojan (RAT) and steal sensitive data from compromised hosts. The package, named \u201c@openclaw-ai\/openclawai,\u201d was uploaded to the registry by a user named \u201copenclaw-ai\u201d on March 3, 2026. It has been downloaded 178 times to date. The [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,34,6],"tags":[],"class_list":["post-232905","post","type-post","status-publish","format-standard","hentry","category-biotech-medical","category-cybercrime-malcode","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/232905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=232905"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/232905\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=232905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=232905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=232905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}