Over 300 malicious GitHub packages masquerading as OpenClaw Docker deployment tools were discovered distributing a LuaJIT-based Trojan. The malware steals credentials, captures screenshots, and sends everything to command-and-control servers in Frankfurt.
Netskope Threat Labs found the campaign in March 2026. The packages looked legitimate with spoofed names, READMEs, and star counts. They specifically targeted people searching for OpenClaw Docker setup guides.
What the malware does
- Captures stored credentials from browsers and password managers
- Takes periodic screenshots of victim machines
- Exfiltrates API keys and tokens from environment variables
- Maintains persistence through cron jobs and systemd services
How to protect yourself
- Only install packages from the official OpenClaw repository
- Verify package authors before running install commands
- Pin your Docker image digests instead of using ":latest"
- Audit your existing packages for anything you don't recognize
If you're not confident in your Docker security setup, managed hosting eliminates the supply chain risk entirely. Services like ClawHosters handle the infrastructure so you don't have to vet every dependency yourself.
Full breakdown with IOCs and detection rules: Read the full article
Top comments (0)