Handler on Duty: Johannes Ullrich
Threat Level: green
Podcast Detail
SANS Stormcast Tuesday, February 3rd, 2026: Scanning for AI; Notepad++ Compromise; OpenClaw Vulnerabilities
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9792.mp3
My Next Class
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
Scanning for exposed Anthropic Models https://isc.sans.edu/diary/Scanning%20for%20exposed%20Anthropic%20Models/32674
Notepad++ Hijacked by State-Sponsored Hackers https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/
https://notepad-plus-plus.org/news/hijacked-incident-info-update/
Insecure Websockets in OpenClaw
https://zeropath.com/blog/openclaw-clawdbot-credential-theft-vulnerability
Malicious OpenClaw Skills
https://www.koi.ai/blog/clawhavoc-341-malicious-clawedbot-skills-found-by-the-bot-they-were-targeting
Exposed OpenClaw Instances
https://censys.com/blog/openclaw-in-the-wild-mapping-the-public-exposure-of-a-viral-ai-assistant
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Tuesday, February 3rd, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Graduate Certificate Program in Incident Response. So today's episode will be a little bit AI heavy, sorry for that, but we'll start with some simple scanning for anthropic models. That's something that we detected over the weekend in our honeypots. Not honestly sure what they're going after, but I assume that they're looking for people who have installed some at least anthropic related models on their own system, then expose it. Maybe some system also exposed them via proxies. I've seen that. So here they may take advantage of any API keys or so that are preloaded and in the proxy that they can abuse. But either way, the scans came from a Tor exit node. And if you're doing anything like this, please just don't expose them to the internet. And Notepad++ today did release an advisory stating that their update website had been compromised at least since June 2025. Now this became sort of news in December last year, when people noticed that something is wrong here with certain files being downloaded from the website. According to this advisory now, it looks like there was a compromise of the hosting infrastructure. So nothing that Notepad++ directly controlled. They have since also changed hosting providers. Sadly, not a lot of details about the exact nature of the compromise here, how it all unfolded. On the other hand, Rapid7 did release a detailed breakdown of the backdoor and how it worked and also indicators of compromise that you may want to use if you're using Notepad++ to check if you had been compromised by any of the malicious files downloaded from Notepad++. So now let's dive in a little bit into the AI topics I have for today. And they're all related to, well, OpenClaw, which also used to be known as ClawdBot and as MoldBot. This is essentially an AI assistant and people like it because it's very easy to connect to different websites, email and the like, and essentially automate sort of a lot of day -to-day workflows with OpenClaw. The problem with this is that, well, in order to function, OpenClaw needs access to all of these different services. And it appears that OpenClaw really sort of is really good in gaining publicity by having really outrageously bad security flaws. We always sort of wonder, you know, how companies' stock tends to go up after they had like a security breach and such. Well, I think OpenClaw really sort of perfected that kind of PR. So let's talk about a couple of the different vulnerabilities here. The first one I have here, and I'm not covering with any particular order, is the ability to steal credentials from OpenClaw. So OpenClaw listens by default on the loopback interface. It can also listen for other inbound connections. But here the loopback interface is particularly interesting. And if you're connecting via the loopback interface, it does not require any authentication, which usually tends to be a real bad idea, has caused a lot of problems for other tools as well. In OpenClaw, you connect to it then via a WebSocket. Now you can just run JavaScript in the user's browser and then connect to the WebSocket via loopback because, well, after all, it runs in the user's browser on the same system. And with that, gain authenticated access to all of the credentials that OpenClaw may have stored. So this was the first vulnerability here. The next issue, also sort of a known problem, and that's extensions. They call it skills that you may be loading into OpenClaw. There are a total of 2,800, according to Koi research, that are available right now. So with that limited kind of ecosystem at this point, they were able to actually audit all 2,800 and found that, well, more than 10%, 340 of them are malicious. And most of them, something like 320 out of the 340 are actually part of one campaign installing InfoSteelers. This is a problem that we had before, of course, in all kinds of similar ecosystems, given that this ecosystem is still somewhat small. It is certainly plausible and not that difficult to do at least a basic audit of all of the skills that are available now. So double check with Koi Securities Research to check if any skills that you installed were on that malicious list. And Census did a quick survey of the internet for exposed OpenClaw installs. And yes, they found more than 20,000 of them. So again, their PR campaign here via vulnerabilities is certainly successful. We have lots of people installing them. Installing and directly exposing OpenClaw is not recommended by the instructions. And they recommend using something like an SH tunnel or so to connect from the outside to your OpenClaw instance. But apparently not all users are reading the instructions or, well, maybe the bot didn't read them right for them. Well, and this is it for today. So thanks for listening. Thanks for liking and subscribing to this podcast and talk to you again tomorrow. Bye.





