PANews reported on March 31 that, according to Jinshi News, the National Network Security Threat and Vulnerability Information Sharing Platform (NVDB) of the Ministry of Industry and Information Technology recently detected that attack groups are exploiting the popularity of OpenClaw (commonly known as "Lobster") to impersonate OpenClaw download websites and installation files, inducing users to download installation files containing malicious programs. Once a user runs the installation file containing malicious programs, the file will secretly load malicious programs on the terminal device, releasing and implanting remote control Trojans, which may lead to network attacks, system control, information leakage, and other consequences. Currently, the impersonated domain names detected include: ai-openclaw.com.cn, web-openclaw.com.cn, and malicious installation package names include: openclaw.zip, openclawAI7beAolenc.zip, openclaw.exe, opeaaleAi_7beAole-x64.exe, etc. Users are advised to download and install OpenClaw and its skill plugins through trusted channels, and to be cautious about clicking on unknown links to prevent network attack risks.


