ANAVEM
Reference
Languagefr
Terminal screen showing npm package installation with warning indicators and keyboard in shadow

Malicious npm Package Mimics OpenClaw AI to Deploy RAT

Cybersecurity researchers found a fake OpenClaw AI npm package that installs remote access trojans and steals data from infected systems.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
9 Mar 2026, 19:31 2 min read 2

Last updated 16 Mar 2026, 01:14

SEVERITYHigh
EXPLOITActive Exploit
PATCH STATUSUnavailable
VENDORnpm
AFFECTEDNode.js developers using npm p...
CATEGORYMalware

Key Takeaways

Fake OpenClaw AI Package Spreads RAT Malware on npm

Security researchers discovered a malicious npm package on March 9, 2026, that impersonates OpenClaw AI software to distribute remote access trojans. The package "@openclaw-ai/openclawai" was uploaded by user "openclaw-ai" on March 3, 2026, and has accumulated 178 downloads over six days.

The malicious package targets developers searching for OpenClaw AI tools by using a deceptive name that closely resembles legitimate AI software. Once installed, the package executes code that deploys RAT malware designed to establish persistent remote access to compromised developer machines.

Developer Systems and Data at Risk

The attack primarily affects Node.js developers who installed the fraudulent package while searching for OpenClaw AI development tools. Systems compromised by this RAT face data theft risks, including source code, credentials, and sensitive project information stored on developer workstations.

The 178 confirmed downloads represent individual installations that may have occurred across development teams, potentially expanding the attack's reach beyond the initial download count. Each infected system becomes a potential entry point for broader network compromise.

Package Remains Active Despite Discovery

The malicious package continues to be available on the npm registry despite researcher disclosure, creating ongoing risk for unsuspecting developers. Organizations should immediately audit their npm dependencies and remove any installations of @openclaw-ai/openclawai from development environments.

Security teams should monitor for indicators of RAT activity on systems where this package was installed, including unusual network connections and unauthorized file access. The CISA Known Exploited Vulnerabilities catalog provides additional guidance on detecting and responding to similar supply chain attacks targeting development infrastructure.

Frequently Asked Questions

How do I check if @openclaw-ai/openclawai is installed on my system?+
Run 'npm list @openclaw-ai/openclawai' in your project directory to check for the malicious package. If found, immediately uninstall it using 'npm uninstall @openclaw-ai/openclawai' and scan your system for RAT indicators.
What data does the OpenClaw AI npm malware steal?+
The RAT deployed by this malicious package can steal source code, developer credentials, API keys, and other sensitive project data stored on compromised systems. It establishes persistent remote access for ongoing data exfiltration.
Is the fake OpenClaw AI package still available on npm?+
Yes, the malicious @openclaw-ai/openclawai package remains active on the npm registry as of March 15, 2026. Developers should avoid installing it and report the package to npm security if encountered.
Emanuel DE ALMEIDA
About the Author

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...