Researchers at JFrog Security disclosed on March 9, 2026, a malicious npm package impersonating the Openclaw AI framework that infected approximately 178 developer machines with the Ghostloader remote access trojan.
The malware, uploaded in early March, targets developers’ SSH keys, browser credentials, cryptocurrency wallets, and access tokens to cloud infrastructure.
JFrog estimates the trojan gives attackers remote command execution on compromised systems and persistence across reboots, creating a potential supply-chain entry point into corporate development networks.
Security researchers uncover Openclaw impersonation attack
The Openclaw impersonation attack was first identified by analysts at JFrog, who said the malware campaign is part of a broader wave of supply-chain attacks targeting open-source development ecosystems.
“The package appears to impersonate a legitimate Openclaw installer while secretly executing malicious scripts during installation,” — JFrog Security Research, threat analysis report.
At first glance, the package appears harmless. The files include ordinary-looking JavaScript code, documentation, and command-line utilities typically associated with developer tools.
However, researchers say the Openclaw impersonation attack activates hidden scripts during installation that simulate a normal software setup routine.
These scripts generate command-line output and progress indicators that mimic legitimate installer behavior, making it difficult for developers to detect the attack.
Behind the scenes, the installer downloads an encrypted payload from a remote command-and-control server controlled by the attackers.
Once decrypted, the payload installs the Ghostloader trojan and establishes persistence on the infected system.
Malware steals credentials and developer access keys
The Openclaw impersonation attack becomes particularly dangerous once the malware gains elevated system privileges.
During installation, the fake setup program displays a system authorization prompt requesting the user’s computer password.
The prompt claims the password is required to configure credentials for the Openclaw environment. If entered, the attackers gain administrative access to the machine.
According to researchers, the Openclaw impersonation attack is designed to collect a wide range of sensitive data from compromised systems.
“The malware targets password databases, browser cookies, and stored credentials that may provide access to cloud infrastructure and developer environments,” — JFrog Security Research.
The trojan also searches for SSH keys and development credentials used to access remote servers.
Because developers often store credentials for production systems on their machines, infected devices can become entry points into larger corporate networks.
In addition to credential harvesting, the malware monitors clipboard activity and scans local directories for files containing authentication data.
Security analysts say the Openclaw impersonation attack highlights why developer workstations remain prime targets for cybercriminals seeking access to valuable digital infrastructure.
Crypto wallets and sensitive files also targeted
Another critical risk associated with the Openclaw impersonation attack is its ability to search for cryptocurrency wallet data stored on infected machines.
Researchers say the malware scans the system for files linked to desktop crypto wallets and browser extensions that store digital asset credentials.
The trojan also looks for seed phrases and wallet recovery files that could allow attackers to access cryptocurrency funds.
Because the Openclaw impersonation attack includes remote access capabilities, attackers can also execute commands, retrieve files, or route network traffic through compromised systems.
This functionality effectively turns infected machines into footholds for broader attacks against organizations and development teams.
The malware also installs persistence mechanisms that ensure it automatically restarts after system reboots.
These mechanisms typically involve hidden directories and modifications to startup configurations.
Supply-chain attacks targeting developers increase
Cybersecurity experts say the Openclaw impersonation attack reflects a broader trend of attackers targeting developer ecosystems through malicious packages and compromised dependencies.
As open-source software repositories grow and AI development tools gain popularity, attackers increasingly disguise malware as useful utilities for developers.
The Openclaw project itself has not been compromised. Instead, the Openclaw impersonation attack relies on impersonating the framework through a misleading package name uploaded to the npm registry.
Security researchers recommend that developers immediately remove the malicious package if it has been installed and review system startup configurations for suspicious entries.
Experts also advise rotating passwords, regenerating SSH keys, and reviewing access logs for unusual activity following potential exposure.
To prevent future incidents, developers are encouraged to install tools only from verified sources, carefully review package names and documentation, and use automated supply-chain security scanners to detect malicious dependencies.
As incidents like the Openclaw impersonation attack continue to emerge, security specialists warn that vigilance across open-source ecosystems will remain essential for protecting developer infrastructure and sensitive credentials.