Threat Actors Abuse Hugging Face and ClawHub for Malware Distribution
Security researchers report active abuse of AI distribution platforms to deliver trojans, stealers, and backdoors. According to Acronis TRU, attackers used repositories on Hugging Face to host payloads and abused the OpenClaw/ClawHub skill marketplace, where the researchers identified 575+ malicious skills across 13 developer accounts. CyberPress and Socket Research independently report hundreds of malicious OpenClaw skills; CyberPress states 314 skills were flagged by multiple vendors and ties a prolific publisher to the account "hightower6eu." Researchers describe multi-stage chains that rely on social engineering, encoded or password-protected downloads, Base64 scripts, and indirect prompt injection to cause agent-driven or user-executed payload retrieval. Separately, OpenClaw announced an integration with VirusTotal to run automated scanning and Code Insight analysis on published skills, per reporting by CybersecurityNews. Researchers published Indicators of Compromise and mitigation recommendations in the Acronis TRU report.
What happened
Security researchers have documented in-the-wild campaigns that use AI distribution platforms for malware delivery. Per the Acronis Threat Research Unit (TRU), attackers leveraged Hugging Face repositories as staging infrastructure for payloads and abused the OpenClaw skill ecosystem to distribute trojans, cryptominers and the AMOS macOS stealer. Acronis TRU reports 575+ malicious skills across 13 developer accounts, and includes Indicators of Compromise and detection artifacts in its writeup. CyberPress and Socket Research independently analysed the OpenClaw/ClawHub marketplace and report hundreds of malicious packages; CyberPress states 314 skills were flagged by multiple security vendors and links a prolific publisher to the account "hightower6eu." CybersecurityNews reports that OpenClaw has integrated VirusTotal Code Insight scanning into ClawHub to automate detection of malicious skills.
Technical details
Editorial analysis - technical context: Researchers describe multiple technical patterns used across campaigns, including multi-stage droppers, password-protected ZIP archives, obfuscated Base64 shell scripts, in-memory execution, process injection, and covert command-and-control (C2) channels. A notable technique documented by Acronis TRU is indirect prompt injection, where hidden instructions embedded in skill metadata or content can cause an agent to fetch and execute external code or run system commands on a user's behalf. These attack chains combine social engineering (masquerading as useful automation tools) with packaging patterns that evade simple signature-based scanning.
Context and significance
Industry context
The incidents highlight a growing supply-chain and distribution risk specific to extensible AI agent ecosystems and community marketplaces. Unlike traditional package managers, agent skills often include metadata that can instruct runtime actions, creating novel abuse surfaces where natural-language-driven behaviors or auxiliary installers trigger secondary payload retrieval. Automated scanning integrations, such as the reported OpenClaw-VirusTotal Code Insight pipeline, target this class of risk but face limits when attackers use obfuscation, encrypted archives, or dynamic hosting on trusted platforms like Hugging Face.
What to watch
For practitioners: Monitor adoption of automated code-analysis and runtime sandboxing for agent skills; watch for expanded use of trusted hosting as staging infrastructure; track vendor detections and emerging IOCs from Acronis TRU, Socket Research, Bitdefender, and VirusTotal; and evaluate packaging standards (deterministic bundles, signed metadata, hash checks) for skills. Observers should also track whether marketplaces adopt mandatory pre-publication scanning and clearer execution permission models for agent actions.
Scoring Rationale
This story is notable for practitioners because it documents a new, scalable distribution vector that leverages AI agent marketplaces and trusted hosting; it raises supply-chain and runtime-execution questions for agent ecosystems.
Practice interview problems based on real data
1,500+ SQL & Python problems across 15 industry datasets — the exact type of data you work with.
Try 250 free problems

