{"id":43780,"date":"2026-02-19T20:42:31","date_gmt":"2026-02-19T12:42:31","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/19\/infostealer-found-stealing-openclaw-ai-identity-and-memory-files\/"},"modified":"2026-02-19T20:42:31","modified_gmt":"2026-02-19T12:42:31","slug":"infostealer-found-stealing-openclaw-ai-identity-and-memory-files","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/19\/infostealer-found-stealing-openclaw-ai-identity-and-memory-files\/","title":{"rendered":"Infostealer Found Stealing OpenClaw AI Identity and Memory Files"},"content":{"rendered":"\n<p>In a discovery that marks a worrying shift in cybercrime, researchers at Hudson Rock have identified a live case where a virus successfully snatched the entire identity and memory of a victim\u2019s personal <a href=\"https:\/\/hackread.com\/tag\/artificial-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI<\/a>. While we usually worry about our bank passwords or credit card numbers, it seems the personal AI assistants we use to manage our daily lives are now the prime targets.<\/p>\n<p>Researchers noted that this wasn&#8217;t even a targeted hit at first. The malware used a broad routine to sweep the computer for sensitive folders, striking gold by accident when it found a folder named <code>.openclaw<\/code>.<\/p>\n<p>This directory belonged to an AI system called <a href=\"https:\/\/hackread.com\/openclaw-add-ons-crypto-theft-macos-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">OpenClaw<\/a> (formerly known as <a href=\"https:\/\/hackread.com\/moltbook-social-platform-ai-agents-talk-humans-watch\/\" target=\"_blank\" data-type=\"post\" data-id=\"141042\" rel=\"noreferrer noopener\">ClawdBot<\/a>). Further investigation revealed that the virus captured the user&#8217;s entire digital life because, as we know it, these assistants store a massive amount of personal context to be helpful. Unfortunately, this is exactly what the hackers wanted.<\/p>\n<h3><strong>What was taken?<\/strong><\/h3>\n<p>The hackers managed to retrieve the victim&#8217;s redacted email address (<code>ayou...gmail.com<\/code>) along with their specific workspace path. These details, though seemingly small, provide a direct map of where the victim stores their most sensitive digital work.<\/p>\n<p>The data stolen from the victim was incredibly detailed, as researchers found three vital files were taken. The first was <code>openclaw.json<\/code>, which acts as the central nervous system. This file contained the victim\u2019s <a href=\"https:\/\/hackread.com\/shadowleak-exploit-exposed-gmail-data-chatgpt-agent\/\">Gmail<\/a> address and a Gateway Token, which is a digital key that could allow a stranger to control the AI remotely.<\/p>\n<p>The second file stolen was <code>device.json<\/code>, which is perhaps even more dangerous. This file contains the privateKeyPem that allows a hacker to sign messages as if they were the victim\u2019s own device, bypassing almost all safety checks.<\/p>\n<p>But the most unsettling part was the third file, named <code>soul.md<\/code>. According to researchers, this file, along with others like <code>MEMORY.md<\/code>, provides an attacker with a \u201cblueprint of the user\u2019s life.\u201d<\/p>\n<h3><strong>A Mirror of the Victim<\/strong><\/h3>\n<p>Hudson Rock used its own AI system, Enki, to assess the damage, and the results were shocking. Because the AI was instructed to be \u201cbold with internal actions\u201d like learning and organising, the stolen files likely held daily logs, private messages, and calendar events. An attacker with these files does not just get a password; they get a \u201cmirror of the victim\u2019s life\u201d and a set of keys to their local machine.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<div>\n<figure><a href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/infostealer-harvesting-openclaw-ai-configurations-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"785\" height=\"1024\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/infostealer-harvesting-openclaw-ai-configurations-1-785x1024.jpg\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/infostealer-harvesting-openclaw-ai-configurations-1-785x1024.jpg 785w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/infostealer-harvesting-openclaw-ai-configurations-1-230x300.jpg 230w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/infostealer-harvesting-openclaw-ai-configurations-1-768x1002.jpg 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/infostealer-harvesting-openclaw-ai-configurations-1-1178x1536.jpg 1178w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/infostealer-harvesting-openclaw-ai-configurations-1-380x496.jpg 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/infostealer-harvesting-openclaw-ai-configurations-1-800x1043.jpg 800w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/infostealer-harvesting-openclaw-ai-configurations-1-1160x1513.jpg 1160w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/infostealer-harvesting-openclaw-ai-configurations-1.jpg 1298w\" sizes=\"auto, (max-width: 785px) 100vw, 785px\" alt=\"Infostealer Found Stealing OpenClaw AI Identity and Memory Files\" \/><\/a><figcaption>The \u201csoul.md\u201d file shows the AI\u2019s behavioral limits and access level to the user\u2019s data, alongside Hudson Rock\u2019s Enki analyzing risks created by the stolen OpenClaw files (Image credit: Hudson Rock).<\/figcaption><\/figure>\n<\/p><\/div>\n<p>As these <a href=\"https:\/\/hackread.com\/top-ai-tools-for-red-teaming-in-2026\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI tools<\/a> move from being &#8220;experimental toys to daily essentials,&#8221; criminals will certainly keep finding the motivation to steal our digital identities, Hudson Rock\u2019s <a href=\"https:\/\/www.infostealers.com\/article\/hudson-rock-identifies-real-world-infostealer-infection-targeting-openclaw-configurations\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">report<\/a> concludes. This case serves as a warning that our digital habits are becoming just as valuable as our bank accounts. It is about time we start treating our AI folders with the same care we give to our house keys.<\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"Infostealer Found Stealing OpenClaw AI Identity and Memory Files\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In a discovery that marks a worrying shift in cybercrim [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-43780","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43780"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43780\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}