PANews reported on March 31 that, according to Jinshi News, the National Network Security Threat and Vulnerability Information Sharing Platform (NVDB) of the Ministry of Industry and Information Technology recently detected that attack groups are exploiting the popularity of OpenClaw (commonly known as "Lobster") to impersonate OpenClaw download websites and installation files, inducing users to download installation files containing malicious programs. Once a user runs the installation file containing malicious programs, the file will secretly load malicious programs on the terminal device, releasing and implanting remote control Trojans, which may lead to network attacks, system control, information leakage, and other consequences. Currently, the impersonated domain names detected include: ai-openclaw.com.cn, web-openclaw.com.cn, and malicious installation package names include: openclaw.zip, openclawAI7beAolenc.zip, openclaw.exe, opeaaleAi_7beAole-x64.exe, etc. Users are advised to download and install OpenClaw and its skill plugins through trusted channels, and to be cautious about clicking on unknown links to prevent network attack risks.
The Ministry of Industry and Information Technology's NVDB warning: Beware of fake OpenClaw download websites and installation files.
Share to:
Author: PA一线
This content is for market information only and is not investment advice.
Follow PANews official accounts, navigate bull and bear markets together
PANews App
24/7 blockchain news tracking and in-depth analysis.

