Back to Blog
Reading time: 8 minutes  |  Last updated: May 11, 2026  |  Category: AI Security

By T.O. Mercer · May 11, 2026 · 8 min read

Fake OpenClaw Installer Steals Your Passwords: How to Check If You're Affected

A fake OpenClaw download site has been distributing the Hologram infostealer since February 2026. It targets over 250 browser extensions, including every major password manager and crypto wallet. If you downloaded OpenClaw from anywhere other than the official site, your credentials may already be gone.

Key takeaways
  • The fake site openclaw-installer[.]com distributes a 130MB Rust-based infostealer disguised as the OpenClaw installer
  • The malware targets 250+ browser extensions: Bitwarden, 1Password, LastPass, NordPass, MetaMask, Phantom, Trust Wallet, and hundreds more
  • It steals browser-saved passwords, cookies, autofill data, credit cards, SSH keys, and desktop files
  • The only safe sources for OpenClaw are openclaw.ai and github.com/openclaw/openclaw
Check your download source right now

If you downloaded OpenClaw from any URL other than openclaw.ai or github.com/openclaw/openclaw, assume your system is compromised. Follow the incident response steps below immediately. Do not wait for symptoms. The Hologram infostealer is designed to operate silently.

Check Official OpenClaw Malicious (Hologram)
Download source openclaw.ai or github.com/openclaw/openclaw openclaw-installer[.]com or typosquatted GitHub orgs
Install method npm package or shell script .7z archive containing .exe
File size Small (Node.js package) ~130MB (padded to evade antivirus)
Requests admin privileges No Yes (aggressively)

How the attack works

Netskope Threat Labs discovered a convincing fake download site at openclaw-installer[.]com, registered on March 9, 2026 on Chinese infrastructure and fronted by Cloudflare. The site links to a typosquatted GitHub organization (openclaw-install/openclaw-installer) instead of the legitimate openclaw/openclaw repository. An earlier wave documented by Huntress used different malicious GitHub repositories between February 2 and 10, 2026, and at one point the fake repository became the top result in Bing's AI search results for "OpenClaw Windows."

The download delivers a file called OpenClaw_x64[.]7z containing a 130MB Rust-based executable padded with fake documentation. The oversized file is deliberate: it clears antivirus file-size thresholds and breaks automated sandbox upload limits. The malware's own PE manifest makes no attempt to hide its identity, openly naming itself "Hologram" with the description "Decoy entity generator for tactical misdirection."

Before executing any malicious code, the dropper runs layered anti-analysis checks: BIOS strings for virtual machines, sandbox detection libraries, MAC address prefixes, blocked usernames, and hardware profiling (GPU, CPU cores, RAM, disk size, screen resolution). If those checks pass, it enforces a "mouse gate," waiting for real mouse movement before continuing. Automated security sandboxes don't generate mouse movement, so the malware sits dormant and never gets flagged during analysis.

Once activated, the dropper downloads a six-part modular framework called the Stealth Packer. One module fingerprints the system to decide whether the victim warrants the full implant. Another beacons to a hijacked Brazilian law firm's subdomain over HTTPS. Others establish Telegram-based persistence and use Azure DevOps and Hookdeck (a webhook relay service) for command and control. The sophistication is well beyond typical infostealer campaigns.

What Hologram steals

The credential theft scope is extensive. Hologram targets over 250 browser extensions across these categories:

Category Targeted extensions What's stolen
Password managers Bitwarden, 1Password, LastPass, NordPass, Dashlane, Keeper, Proton Pass, RoboForm Extension session data, autofill databases, vault unlock tokens
Crypto wallets MetaMask, Phantom, Trust Wallet, Coinbase Wallet, 200+ more Wallet keys, seed phrases, transaction signing capabilities
Browser credentials Chrome, Firefox, Edge, Brave saved passwords All stored passwords, cookies, session tokens, autofill data, credit cards
System files SSH keys, desktop files, documents ~/.ssh/ directory, files from Desktop and Documents folders

The GhostSocks module (identified by Huntress in the earlier February wave) adds an additional layer: it routes traffic through your machine, allowing attackers to use your IP address to bypass anti-fraud detection on financial services. Your machine becomes a proxy for the attacker's own activities.

How to check if you're affected

Step 1: Verify your download source

Check your browser history and downloads folder. The only legitimate OpenClaw download sources are:

If you see openclaw-installer.com, openclaw-install (GitHub org), or any other domain in your download history, your system is likely compromised.

Step 2: Check for the malicious executable

Search your system for these filenames:

# Windows
dir /s /b C:\Users\%USERNAME%\Downloads\OpenClaw_x64*
dir /s /b C:\Users\%USERNAME%\Downloads\svc_service.exe

# macOS / Linux
find ~/Downloads -name "OpenClaw_x64*" -o -name "svc_service"

The legitimate OpenClaw installer is a standard Node.js package installed via npm or the shell script at openclaw.ai/install.sh. It is not a 130MB archive. If you have a file matching OpenClaw_x64.7z or OpenClaw_x64.exe, that's the malicious version.

Step 3: Run a malware scan

Run a full system scan with Malwarebytes (free) or your installed antivirus. The Hologram dropper has low detection rates on initial release, but signatures have been updated since Netskope's disclosure. Also check for svc_service.exe running in your process list, which is the Stealth Packer's persistence mechanism.

Step 4: Rotate every credential the malware could reach

If you ran the fake installer, assume everything is compromised. Rotate credentials in this order:

Run your new passwords through our password strength checker to confirm they meet the 16-character minimum recommended for 2026.

After the Hologram cleanup

Your browser-saved passwords are gone. Replace them properly.

Hologram targeted every major browser's credential store. If you were saving passwords in Chrome, Firefox, or Edge, those credentials have been exfiltrated. A dedicated password manager with zero-knowledge encryption keeps your credentials in a vault that browser-targeting malware can't reach. NordPass uses XChaCha20 encryption, supports passkeys, and includes breach monitoring that alerts you when your credentials appear in known data leaks.

Try NordPass Free

Affiliate link. We earn a small commission if you upgrade, at no cost to you.

If you already uninstalled OpenClaw, you're not safe yet

Uninstalling OpenClaw (real or fake) does not remove the Hologram implant. The Stealth Packer framework installs persistence mechanisms independent of the OpenClaw application. GhostSocks continues routing traffic through your machine even after OpenClaw is gone.

If you're planning to uninstall OpenClaw, follow our complete removal guide to clean up the application files, but understand that a separate malware removal process is needed if you ran the fake installer. A full system scan, credential rotation, and potentially a clean OS reinstall are the only reliable remediation.

This is the fourth major OpenClaw security event in 2026

The fake installer campaign joins a growing list of OpenClaw security incidents this year:

If you're running OpenClaw on a dedicated Mac Mini with the hardening steps from our guide (dedicated user account, loopback-only gateway, token authentication), you're protected against the ClawHub and CVE attacks. But the fake installer campaign targets the download process itself, before any hardening can take effect.

For anyone evaluating whether OpenClaw is worth the security overhead, our OpenClaw alternatives comparison covers NemoClaw, Claude Code, n8n, and other AI agents with different security architectures. NemoClaw adds kernel-level sandboxing that would contain infostealer activity even if a fake installer made it onto the system.

Technical indicators (IOCs)

For incident response teams:

Sources: Netskope Threat Labs, Huntress, CyberSecurityNews.

TM
T.O. Mercer

T.O. Mercer is a DevSecOps engineer and the researcher behind the analysis of 50,000+ breached passwords. He writes about password security, credential management, and the intersection of AI and cybersecurity at SafePasswordGenerator.net.