{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiadgdaevnlmfukb5ook4rrqaos3zmdxjju7chwx2ixui4i6sgfbwe",
"uri": "at://did:plc:xb5etev7ncohgebas3kjeqek/app.bsky.feed.post/3mfaqxkn5ka32"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreifpifswxec65gmm3vn2uuw3v4jnorm5cxtohxw4smhi2p2jb65igu"
},
"mimeType": "image/jpeg",
"size": 48348
},
"path": "/infostealer-steal-openclaw-ai-identity-memory-files/",
"publishedAt": "2026-02-19T10:06:10.000Z",
"site": "https://hackread.com",
"tags": [
"Security",
"Artificial Intelligence",
"Malware",
"AI",
"Cyber Attack",
"Cybersecurity",
"Hudson Rock",
"Infostealer",
"OpenClaw",
"Vulnerability"
],
"textContent": "Researchers at Hudson Rock have identified a live infection where an infostealer exfiltrated a victim’s OpenClaw configuration. The discovery highlights a shift in malware behaviour toward harvesting personal AI identity files.",
"title": "Infostealer Found Stealing OpenClaw AI Identity and Memory Files"
}