Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (acronis.com) Exploitation of AI Platforms: How Threat Actors Abuse Hugging Face and ClawHub for Malware Delivery

(acronis.com) Exploitation of AI Platforms: How Threat Actors Abuse Hugging Face and ClawHub for Malware Delivery

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (acronis.com) Exploitation of AI Platforms: How Threat Actors Abuse Hugging Face and ClawHub for Malware Delivery

    Threat actors are actively abusing AI platforms Hugging Face and ClawHub for large-scale malware delivery, exploiting trust in AI ecosystems to distribute trojans, cryptominers, and infostealers like AMOS. Over 575 malicious OpenClaw skills were identified across 13 developer accounts.

    In brief - Cybercriminals are weaponizing AI distribution platforms to deliver malware at scale, leveraging indirect prompt injection and social engineering to compromise Windows and macOS systems. The abuse of Hugging Face and ClawHub highlights critical risks in AI supply chains.

    Technically - Attackers use indirect prompt injection on ClawHub to turn AI agents into intermediaries, executing base64-encoded commands or installing password-protected archives. Payloads include AMOS stealer (macOS) and cryptominers (Windows), with persistence via scheduled tasks and Defender exclusions. On Hugging Face, campaigns like ITHKRPAW and FAKESECURITY employ obfuscated PowerShell, Cloudflare Workers, and dead-drop resolvers (e.g., Telegram bots) for C2. Techniques include XOR/AES encryption, process injection, and high-entropy overlays to evade detection.

    Source: https://www.acronis.com/en/tru/posts/poisoning-the-well-ai-supply-chain-attacks-on-hugging-face-and-openclaw/

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups