AMOS Infostealer Targets macOS Through Popular AI Assistant Ecosystem

Related

Windows 11 Security Update KB5077181 Triggers Boot Failures and System Instability

What happened Microsoft’s February 10, 2026 Patch Tuesday security update...

Google Links Suspected Russian Actor to CANFAIL Malware Targeting Ukrainian Organizations

What happened Google’s Threat Intelligence Group (GTIG) has publicly attributed...

Share

What happened

Threat actors are distributing the AMOS infostealer by poisoning the skill marketplace of the OpenClaw AI assistant ecosystem to compromise macOS systems. According to researchers, the campaign—known as ClawHavoc—involved attackers uploading malicious OpenClaw skills disguised as legitimate add-ons such as productivity tools, cryptocurrency utilities, and integrations for popular services. When installed, these malicious skills deployed the Atomic macOS Stealer (AMOS), enabling attackers to extract browser credentials, cryptocurrency wallet data, SSH keys, session cookies, and other sensitive information. 

AMOS operates as a credential-harvesting malware platform that enumerates system credential stores, browsers, and messaging applications to rapidly collect authentication data and transmit it to attacker-controlled infrastructure.  The campaign exploited OpenClaw’s popularity as an AI assistant platform, leveraging user trust in marketplace extensions to facilitate malware installation and credential theft. 

Who is affected

macOS users who installed malicious OpenClaw skills or AI assistant extensions are affected, as AMOS can harvest credentials, cryptocurrency wallet information, and authentication session data directly from compromised systems. 

Why CISOs should care

The use of AI assistant extension marketplaces to distribute infostealer malware highlights how trusted software ecosystems can become distribution channels for credential theft, increasing risk to enterprise identity security and access control. 

3 practical actions

  • Audit AI assistant extensions. Review installed OpenClaw skills and remove unauthorized or suspicious add-ons.
  • Monitor credential exposure indicators. Detect signs of credential harvesting, session theft, or unusual authentication activity.
  • Restrict extension installation. Limit installation of third-party extensions to vetted and approved sources only.