Back

Fake OpenClaw Installer Targets Crypto Wallets and Password Managers

Severity: High (Score: 64.5)

Sources: Gbhackers

Summary

A new malware campaign is exploiting a fake OpenClaw installer to deploy the Hologram infostealer framework, which is designed to harvest credentials from over 250 crypto wallet and password manager browser extensions. The malware, delivered as a 130MB Rust-compiled executable, is disguised with fake documentation to bypass antivirus detection mechanisms. Affected services include popular wallets like MetaMask and Phantom, as well as password managers like Bitwarden. The campaign utilizes trusted cloud and messaging services to distribute the malicious installer. Users are urged to remain vigilant and verify the authenticity of software downloads. The attack is ongoing, with no specific mitigation strategies provided yet. Key Points: • Fake OpenClaw installer is used to deploy the Hologram infostealer framework. • The malware targets over 250 crypto wallets and password managers, including MetaMask and Bitwarden. • The executable is padded with fake documentation to evade antivirus detection.

Key Entities

  • Malware (attack_type)
  • Hologram (malware)
  • OpenClaw (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed