Attackers Use Bing AI Search to Distribute GhostSocks Malware
Malicious GitHub repositories exploiting Bing AI search results to distribute infostealers and GhostSocks proxy malware. Fake OpenClaw installers turn victims into residential proxies.
Security researchers identified malicious GitHub repositories exploiting Bing AI search results to distribute information stealers and GhostSocks malware between February 2 and 10, 2026. The campaign demonstrates how quickly threat actors weaponize new technologies to steal credentials and turn compromised machines into residential proxies.
The attack exploited Bing's AI search capabilities for distribution. When someone searched "OpenClaw Windows" through Bing, the AI suggestion linked directly to a newly-created malicious GitHub repository named openclaw-installer. Simply hosting the malware on GitHub was enough to poison the search results and propel the malicious repo to the top suggestion.
GhostSocks: Turning Victims into Proxies
GhostSocks is proxy malware used by criminals to turn compromised machines into residential proxies. These proxies route malicious traffic and access compromised accounts using stolen credentials. Using a proxy machine allows criminals to bypass anti-fraud checks when accessing accounts, making stolen credentials more valuable.
The residential proxy network aspect makes this particularly concerning. Beyond the initial credential theft, infected machines become infrastructure for future attacks—credential stuffing, account takeover, and fraud operations all benefit from routing through legitimate residential IP addresses.
This attack follows a pattern similar to the StripeAPI.NET NuGet typosquat that targeted developer ecosystems through package repository poisoning. The key difference: this campaign uses AI search results rather than dependency confusion.
Attack Infrastructure
The malicious repository was created by an account that joined GitHub in September 2025 but had no public activity until it opened an issue on the official OpenClaw repository promoting another repository—openclaw-trading-assistant—under the organization molt-bot. That issue was later marked as spam by maintainers.
The malware-laced installers were disguised as legitimate OpenClaw software. OpenClaw is a popular open-source AI agent framework, making it an attractive target for impersonation. Users seeking to install the tool through search engines instead of official channels became victims.
We previously covered how Vidar infostealers began targeting OpenClaw configuration files, stealing agent credentials and memory files. This campaign takes a different approach—instead of stealing from existing OpenClaw users, attackers create fake installation vectors to compromise users before they even set up the software.
AI Search Manipulation
The Bing AI search results lent credibility to the malicious repository. AI-generated search summaries don't inherently validate the trustworthiness of sources they cite. When an AI confidently suggests a link as the answer to a user's query, users tend to trust that recommendation.
This represents an emerging threat vector as AI search becomes more prevalent. Traditional SEO poisoning required significant effort to rank malicious pages. AI search can be manipulated through different signals—repository activity, issue discussions, and other GitHub-specific metadata that the AI interprets as relevance signals.
The shadow-reactor Remcos RAT campaign showed similar patterns of attackers exploiting trusted developer infrastructure. GitHub's reputation as a legitimate platform provides cover for malicious repositories before they're reported and removed.
Protecting Against AI Search Poisoning
- Verify official sources - Navigate to software projects through official websites, not search results
- Check repository age - Newly created repositories claiming to be established software are red flags
- Review commit history - Legitimate projects have meaningful commit histories
- Look for verification - Official projects often have verified organization badges on GitHub
- Use official package managers - When available, install through pip, npm, or cargo rather than random installers
The malicious repositories have been reported and removed from GitHub. Organizations should check endpoint detection logs for connections to residential proxy infrastructure, which may indicate GhostSocks infections.
Related Articles
Fake Claude Code Repos Push Vidar Infostealer on GitHub
Threat actors weaponized Anthropic's accidental source code leak to distribute Vidar malware through trojanized GitHub repos. Here's how the attack works.
Apr 4, 2026Black Cat Infects 278,000 Hosts in China via SEO Poisoning
Cybercrime group uses fake software downloads and malicious Bing ads to deploy infostealer malware at scale across Chinese systems.
Jan 17, 2026NWHStealer Spreads via Fake Proton VPN Sites and Gaming Mods
Multiple campaigns distribute NWHStealer infostealer through counterfeit Proton VPN installers, gaming modifications, and YouTube-promoted downloads. Targets browser data and 25+ crypto wallets.
Apr 16, 2026108 Chrome Extensions Steal OAuth Tokens and Telegram Sessions
Security researchers expose 108 malicious Chrome extensions operating under five fake publishers, stealing Google OAuth tokens, Telegram sessions, and injecting ads. Over 20,000 users affected.
Apr 16, 2026