Microsoft Bing's AI-enhanced search features have recently been exposed to a security vulnerability. According to reports, hackers are exploiting Bing AI's search recommendation mechanism to push fake OpenClaw installation programs hosted on GitHub to users seeking specific AI tools.
OpenClaw is a popular open-source AI agent. Due to its advanced permissions, such as accessing local files and integrating email and various online services, it has become an "excellent platform" for hackers to steal sensitive information. Researchers from the security company Huntress found that hackers have successfully bypassed Bing AI's algorithm by faking GitHub organizations and copying real project code, allowing them to gain high recommendation weights in search results.
For users of different systems, hackers have developed differentiated "poisoning" schemes:
macOS Users: Fake pages guide users to run malicious scripts in the terminal, triggering the download of a keylogger called Atomic Stealer.
Windows Users: They distribute a forged file named "OpenClaw_x64.exe," which silently runs the Vidar keylogger in memory to steal account data and implants the GhostSocks malware to turn the computer into a proxy node for hackers.
Researchers pointed out that this "search pollution" currently mainly appears on the Bing platform and there is no evidence that Google Search has been similarly affected. Experts remind developers that when obtaining high-privilege AI tools, they should definitely use official channels and avoid running unknown scripts directly through search recommendations.
Key Points
🚨 AI Recommendation Compromised: Hackers forge projects on GitHub and manipulate weights to mislead Bing AI into recommending malicious installers.
🕵️ High-Privilege Trap: Using OpenClaw's own system access privileges, hackers can easily obtain user-sensitive data and control terminals.
🛠️ Targeted Cross-Platform Attacks: Different keylogging programs have been deployed for Mac and Windows users, showing strong targeting and stealthiness.
