BTC
ETH
SOL
BNB
GOLD
XRP
DOGE
ADA
Back to home
Tech

If you’re running OpenClaw, you probably got hacked in the last week

Last week, a supply chain attack hit OpenClaw, an open-source Rust CLI tool for Bitcoin wallets using the Claw confidential transactions protocol.

Last week, a supply chain attack hit OpenClaw, an open-source Rust CLI tool for Bitcoin wallets using the Claw confidential transactions protocol. Attackers pushed version 0.4.0 with embedded backdoor code that exfiltrates private keys to a command-and-control server. If you updated or run this version, your funds are likely gone—reports show at least 12 wallets drained, totaling over 4.2 BTC ($250,000 at current prices).

The incident surfaced on Hacker News after a user spotted suspicious outbound traffic to 185.199.108.133, a server in an AWS Tokyo region. Reverse engineering revealed the malware hooks into wallet generation and backup functions. It base64-encodes seed phrases and keys, then POSTs them via HTTPS to the C2 endpoint. No encryption protects the payload. The attack ran silently from October 10-16, 2024, affecting Linux, macOS, and Windows binaries downloaded via Cargo or direct GitHub releases.

Attack Vector and Timeline

Attackers compromised the OpenClaw GitHub repo. They force-pushed a tampered tag for v0.4.0 on October 9, bypassing GPG signatures—the project lacked reproducible builds or commit signing. Cargo users pulled the poisoned crate automatically. Over 500 downloads occurred in 48 hours per crates.io stats before takedown. The maintainer, @clawdev on X, claims account hijacking via a phishing SIM swap; GitHub audit logs show login from a Ukrainian IP at 02:47 UTC.

Claw protocol itself remains solid—it’s a zero-knowledge proof system for private Bitcoin transfers, audited by Blockstream in 2023. But OpenClaw’s single-maintainer status amplified risks. No multi-sig release process existed, and dependency on unverified Rust crates like reqwest and serde left it vulnerable. Similar to the 2023 PyPI crypto lib attacks (e.g., python-telegram-bot hacks draining $1M+), this underscores open-source crypto tools’ fragility.

Immediate Actions

Stop everything. Quarantine affected machines. Run these checks:

# Check installed version
cargo install openclaw --dry-run | grep version

# Scan for C2 traffic (Linux/macOS)
sudo netstat -tulpn | grep 185.199.108.133
sudo ss -tulpn | grep 185.199.108.133

# Hunt malware binary
find / -name "openclaw" -type f 2>/dev/null | xargs ls -la
strings $(which openclaw 2>/dev/null) | grep -i "185.199.108.133"

Rotate all seeds generated post-October 9. Wipe and reinstall from v0.3.9 commit 7f2a1b9, verified via git clone https://github.com/clawwallet/openclaw.git && git checkout 7f2a1b9. Monitor blockchain explorers like Blockchair for your addresses—attackers swept funds to bc1q… mixer addresses. File claims with GitHub and report to CERT/CC.

Broader crypto ecosystem fallout: Claw adoption stalled 15% post-disclosure per GitHub stars drop. Users fled to alternatives like Wasabi or Samourai, but those carry their own risks (e.g., Samourai’s 2024 seizure). This hack cost real money—victims included small holders and one whale losing 2.1 BTC.

Why this matters: Supply chain attacks now hit 70% of breaches per Verizon DBIR 2024. In crypto, where code handles millions, trust breaks fast. Developers, enable sigs, reproducible builds, and sigstore.dev. Users, verify hashes before install—sha256sum openclaw-v0.3.9-x86_64-unknown-linux-gnu.tar.gz should match published digests. Skeptical take: Maintainer story checks out, but lax opsec (no 2FA hardware keys) enabled it. Fair point—solo projects bootstrap innovation but crumble under targeted ops. Shift to collectives like Threshold Network for Claw or bust.

Lessons stick: Audit your stack. Crypto’s permissionless promise demands paranoid verification. One bad crate, and you’re rekt.

April 3, 2026 · 3 min · 19 views · Source: Hacker News

Related