Recently, the Network Security Threat and Vulnerability Information Sharing Platform (NVDB), operating under the auspices of the Ministry of Industry and Information Technology (MIIT), has detected a concerning trend: attackers are capitalizing on OpenClaw's widespread popularity. They are setting up fraudulent download websites and crafting fake installation files to entice users into downloading files that harbor malicious software. Once executed by unsuspecting users, these malicious programs stealthily infiltrate terminal devices, deploying and embedding remote-control Trojans. This could lead to severe repercussions, including network attacks, unauthorized system control, and sensitive information leakage. The fraudulent domain names under surveillance include ai-openclaw.com.cn and web-openclaw.com.cn, while the names of malicious installation packages encompass openclaw.zip, openclaw.exe, among others. It is strongly advised that users obtain and install OpenClaw and its skill plugins exclusively through reputable sources. Exercise caution when encountering unfamiliar links and remain on guard against the potential hazards of network attacks.
