Attackers Use Bing AI Search to Distribute GhostSocks Malware
Malicious GitHub repositories exploiting Bing AI search results to distribute infostealers and GhostSocks proxy malware. Fake OpenClaw installers turn victims into residential proxies.
Security researchers identified malicious GitHub repositories exploiting Bing AI search results to distribute information stealers and GhostSocks malware between February 2 and 10, 2026. The campaign demonstrates how quickly threat actors weaponize new technologies to steal credentials and turn compromised machines into residential proxies.
The attack exploited Bing's AI search capabilities for distribution. When someone searched "OpenClaw Windows" through Bing, the AI suggestion linked directly to a newly-created malicious GitHub repository named openclaw-installer. Simply hosting the malware on GitHub was enough to poison the search results and propel the malicious repo to the top suggestion.
GhostSocks: Turning Victims into Proxies
GhostSocks is proxy malware used by criminals to turn compromised machines into residential proxies. These proxies route malicious traffic and access compromised accounts using stolen credentials. Using a proxy machine allows criminals to bypass anti-fraud checks when accessing accounts, making stolen credentials more valuable.
The residential proxy network aspect makes this particularly concerning. Beyond the initial credential theft, infected machines become infrastructure for future attacks—credential stuffing, account takeover, and fraud operations all benefit from routing through legitimate residential IP addresses.
This attack follows a pattern similar to the StripeAPI.NET NuGet typosquat that targeted developer ecosystems through package repository poisoning. The key difference: this campaign uses AI search results rather than dependency confusion.
Attack Infrastructure
The malicious repository was created by an account that joined GitHub in September 2025 but had no public activity until it opened an issue on the official OpenClaw repository promoting another repository—openclaw-trading-assistant—under the organization molt-bot. That issue was later marked as spam by maintainers.
The malware-laced installers were disguised as legitimate OpenClaw software. OpenClaw is a popular open-source AI agent framework, making it an attractive target for impersonation. Users seeking to install the tool through search engines instead of official channels became victims.
We previously covered how Vidar infostealers began targeting OpenClaw configuration files, stealing agent credentials and memory files. This campaign takes a different approach—instead of stealing from existing OpenClaw users, attackers create fake installation vectors to compromise users before they even set up the software.
AI Search Manipulation
The Bing AI search results lent credibility to the malicious repository. AI-generated search summaries don't inherently validate the trustworthiness of sources they cite. When an AI confidently suggests a link as the answer to a user's query, users tend to trust that recommendation.
This represents an emerging threat vector as AI search becomes more prevalent. Traditional SEO poisoning required significant effort to rank malicious pages. AI search can be manipulated through different signals—repository activity, issue discussions, and other GitHub-specific metadata that the AI interprets as relevance signals.
The shadow-reactor Remcos RAT campaign showed similar patterns of attackers exploiting trusted developer infrastructure. GitHub's reputation as a legitimate platform provides cover for malicious repositories before they're reported and removed.
Protecting Against AI Search Poisoning
- Verify official sources - Navigate to software projects through official websites, not search results
- Check repository age - Newly created repositories claiming to be established software are red flags
- Review commit history - Legitimate projects have meaningful commit histories
- Look for verification - Official projects often have verified organization badges on GitHub
- Use official package managers - When available, install through pip, npm, or cargo rather than random installers
The malicious repositories have been reported and removed from GitHub. Organizations should check endpoint detection logs for connections to residential proxy infrastructure, which may indicate GhostSocks infections.
Related Articles
Black Cat Infects 278,000 Hosts in China via SEO Poisoning
Cybercrime group uses fake software downloads and malicious Bing ads to deploy infostealer malware at scale across Chinese systems.
Jan 17, 2026AuraStealer Expands to 48 C2 Domains Filling Lumma Void
Russian-speaking developers behind AuraStealer infostealer scale infrastructure to 48 command-and-control domains, targeting 110+ browsers and 250+ extensions.
Mar 4, 2026QuickLens Chrome Extension Steals Crypto via ClickFix
Malicious QuickLens browser add-on combines Google Lens functionality with ClickFix social engineering to drain cryptocurrency wallets through fake CAPTCHA prompts.
Feb 28, 2026Attackers Weaponize ClawHub Comments to Deliver Infostealers
Threat actors bypass ClawHub security by hiding Base64 payloads in fake troubleshooting comments. Atomic Stealer delivered to unsuspecting OpenClaw users.
Feb 24, 2026