Bing AI Search Results Allegedly Poisoned: Hackers Distribute Fake OpenClaw Installer to Steal Crypto Assets

2026-03-10 03:49:22
Beginner
AISecurity
Security researchers have identified that hackers are exploiting "search poisoning" to manipulate Bing AI search results, steering users toward downloading a fake OpenClaw application embedded with infostealer malware, leading to the theft of crypto assets and sensitive information. This article examines the attack methodology, technical specifics, and the broader implications for the industry.

Event Overview: Bing AI Search Results Suspected of Poisoning

Bing AI Search Results Suspected of Poisoning Image source: https://x.com/im23pds/status/2031163246783410581

In March 2026, the head of security at blockchain security firm SlowMist issued a public alert, warning that attackers may have manipulated Bing AI's search results using "search poisoning" tactics. These actors lured users into downloading a counterfeit OpenClaw program, stealing crypto assets and sensitive information.

"Search poisoning" refers to attackers crafting specific websites or repositories to boost their ranking in search engine results. When users look up relevant keywords, malicious sites can be promoted to the top, or even be cited directly by AI-powered search results.

In this case, searching for keywords like “OpenClaw Windows” prompted Bing AI to recommend a fraudulent GitHub repository as the download source. After running the installer, some users' devices were infected with information-stealing malware.

Security researchers later confirmed that the malicious repository and installer had been removed, but the incident triggered widespread industry debate about AI search security and crypto asset protection.

What Is OpenClaw? Why Is It Targeted?

What Is OpenClaw? Why Is It Targeted? Image source: OpenClaw Official Site

OpenClaw is a recently popular open-source tool in the AI agent and automation development community, mainly used for building AI agents, automating tasks, and creating developer toolchains.

As AI agent and automation development frameworks rapidly evolve, user adoption of such tools is surging.

This quickly expanding developer ecosystem is an attractive target for attackers, for several reasons:

  • Developers trust open-source repositories: Developers are accustomed to downloading tools and code from GitHub.
  • AI toolchains often require high-level permissions: Many AI tools need access to system files, API keys, or cloud credentials.
  • Significant overlap with crypto users: AI developers, Web3 developers, and crypto investors are often the same individuals.

As a result, by distributing fake OpenClaw installers, attackers can directly target devices containing wallet private keys, trading accounts, or API keys.

Attack Mechanism: From Search Poisoning to Malware Distribution

GitHub Repository Spoofing and Abusing Community Trust

Researchers identified that attackers created a GitHub organization called “openclaw-installer” and uploaded what appeared to be legitimate repositories.

To increase credibility, they even copied portions of the real project’s source code, making the repository structure look authentic.

Given GitHub’s strong reputation in the developer community and the added weight of AI-powered recommendations, many users assumed the repository was official.

The attack unfolded as follows:

  • User searches for OpenClaw via Bing AI
  • AI recommends the malicious GitHub repository
  • User downloads the fake installer
  • Malicious code silently executes information-stealing operations

This attack leverages open-source ecosystem trust + AI search recommendations, greatly increasing its success rate.

Distinct Payloads for Windows and macOS

Researchers found that attackers crafted different payloads for each operating system.

Windows attack path:

  • Distributes a counterfeit installer called OpenClaw_x64.exe
  • On execution, launches the Vidar info-stealer in memory
  • Simultaneously installs the GhostSocks trojan for remote control

macOS attack path:

  • Provides bogus installation instructions
  • Tricks users into running Bash commands in Terminal
  • Downloads and installs Atomic Stealer malware

These malicious programs primarily steal:

  • Browser passwords
  • Crypto wallet keys
  • SSH keys
  • API tokens
  • Telegram/Discord login credentials

Once obtained, attackers can quickly transfer the victim’s crypto assets.

AI Search and SEO Poisoning: The New Frontier for Cyber Attacks

While search poisoning isn’t new, the rise of AI search is amplifying its effects. Research shows attackers can manipulate web content, repository structures, or keywords to push malicious resources higher in search results.

AI search introduces additional risks:

  • AI actively summarizes and recommends content
  • Users are more likely to trust AI recommendations
  • Recommended links may bypass traditional search filters

Security analysts point out that simply hosting malicious code in a seemingly legitimate GitHub repository can get it indexed and recommended by search engines.

As a result, the combination of AI search + open-source platforms is becoming a major new attack vector.

Impact on the Crypto Industry and Developer Ecosystem

This incident highlights three significant trends:

1. AI tools are now prime attack vectors

As AI agents and automation tools become mainstream, attackers are disguising malware as AI tools.

2. Open-source trust is being exploited

Platforms like GitHub and PyPI, while open and transparent, are also easily abused by attackers.

3. Crypto assets are prime targets

Stealer malware typically seeks:

  • MetaMask
  • Browser wallets
  • Local wallet files
  • API keys

Once stolen, these assets are rarely recoverable.

User Security Guide: How to Avoid Similar Attacks

As attack techniques grow more sophisticated, users should consider the following precautions:

1. Download software only from official sources

Don’t download tools directly from search results; always use the official GitHub or website.

2. Verify code repositories

Check for:

  • Official verification
  • Long-term commit history
  • An active developer community

3. Check installer signatures

Many security-conscious projects provide SHA256 or GPG signatures.

4. Use dedicated devices for private key management

Never store high-value wallet private keys in your development environment.

5. Use hardware wallets

Even if your computer is compromised, hardware wallets offer strong additional protection.

The Bing AI search poisoning incident demonstrates that AI search systems still struggle to reliably filter trustworthy content.

As AI search, AI agents, and automation tools become essential entry points to the internet, attackers are evolving their methods, including:

  • AI search poisoning
  • AI-generated content deception
  • Malicious code in AI agent plugins

Looking ahead, platforms will need to bolster defenses by:

  • Strengthening AI search result source verification mechanisms
  • Implementing trust scoring for open-source repositories
  • Enhancing automated malware detection

For users, in an era where AI tools and crypto assets are deeply integrated, security awareness will be the most important line of defense for protecting digital assets.

Author:  Max
Disclaimer
* The information is not intended to be and does not constitute financial advice or any other recommendation of any sort offered or endorsed by Gate.
* This article may not be reproduced, transmitted or copied without referencing Gate. Contravention is an infringement of Copyright Act and may be subject to legal action.

Share

Crypto Calendar
Tokenların Kilidini Aç
Wormhole, 3 Nisan'da 1.280.000.000 W token açacak ve bu, mevcut dolaşımdaki arzın yaklaşık %28,39'unu oluşturacak.
W
-7.32%
2026-04-02
Tokenların Kilidini Aç
Pyth Network, 19 May'da 2.130.000.000 PYTH tokenini serbest bırakacak ve bu, mevcut dolaşım arzının yaklaşık %36,96'sını oluşturacak.
PYTH
2.25%
2026-05-18
Tokenların Kilidini Aç
Pump.fun, 12 Temmuz'da 82,500,000,000 PUMP token'ı kilidini açacak ve bu, mevcut dolaşımdaki arzın yaklaşık %23,31'ini oluşturacak.
PUMP
-3.37%
2026-07-11
Token Kilidi Açma
Succinct, 5 Ağustos'ta mevcut dolaşımdaki arzın yaklaşık %104,17'sini oluşturan 208,330,000 PROVE token'ını serbest bırakacak.
PROVE
2026-08-04
sign up guide logosign up guide logo
sign up guide content imgsign up guide content img
Sign Up

Related Articles

Arweave: Capturing Market Opportunity with AO Computer
Beginner

Arweave: Capturing Market Opportunity with AO Computer

Decentralised storage, exemplified by peer-to-peer networks, creates a global, trustless, and immutable hard drive. Arweave, a leader in this space, offers cost-efficient solutions ensuring permanence, immutability, and censorship resistance, essential for the growing needs of NFTs and dApps.
2024-06-08 14:46:17
 The Upcoming AO Token: Potentially the Ultimate Solution for On-Chain AI Agents
Intermediate

The Upcoming AO Token: Potentially the Ultimate Solution for On-Chain AI Agents

AO, built on Arweave's on-chain storage, achieves infinitely scalable decentralized computing, allowing an unlimited number of processes to run in parallel. Decentralized AI Agents are hosted on-chain by AR and run on-chain by AO.
2024-06-18 03:14:52
False Chrome Extension Stealing Analysis
Advanced

False Chrome Extension Stealing Analysis

Recently, several Web3 participants have lost funds from their accounts due to downloading a fake Chrome extension that reads browser cookies. The SlowMist team has conducted a detailed analysis of this scam tactic.
2024-06-12 15:30:24
What is AIXBT by Virtuals? All You Need to Know About AIXBT
Intermediate

What is AIXBT by Virtuals? All You Need to Know About AIXBT

AIXBT by Virtuals is a crypto project combining blockchain, artificial intelligence, and big data with crypto trends and prices.
2025-01-07 06:43:58
AI Agents in DeFi: Redefining Crypto as We Know It
Intermediate

AI Agents in DeFi: Redefining Crypto as We Know It

This article focuses on how AI is transforming DeFi in trading, governance, security, and personalization. The integration of AI with DeFi has the potential to create a more inclusive, resilient, and future-oriented financial system, fundamentally redefining how we interact with economic systems.
2024-11-28 03:45:01
AI+Crypto Landscape Explained: 7 Major Tracks & Over 60+ Projects
Advanced

AI+Crypto Landscape Explained: 7 Major Tracks & Over 60+ Projects

This article will explore the future development of AI and cryptocurrency, as well as explore investment opportunities, through seven modules: computing power cloud, computing power market, model assetization and training, AI Agent, data assetization, ZKML, and AI applications.
2024-04-19 02:38:55