Beware of fake AI tools: How GhostClaw hijacks macOS: Header image
Emerging Threats 5 min read

Beware of fake AI tools: How GhostClaw hijacks macOS

Published:Mar 24, 2026

Updated:Mar 24, 2026

As AI and agentic AI evolve, Mac developers and other users are being tricked by cybercriminals into downloading and installing malware. The AI ecosystem currently being abused and impersonated most is OpenClaw. This AI agent hub and community is currently used by over 2 million people. 

While threats linked to OpenClaw are numerous, in this report, we focus on a cybercriminal campaign that used a popular developers’ site to infect Mac users with a novel piece of malware, GhostLoader.

Meet GhostLoader, a new multi-stage macOS stealer 

The JFrog Security research team reported on a now-deactivated malicious package that was uploaded to NPM. NPM is a developer site and the official JavaScript package manager.

The malicious package uploaded by criminals was named @openclaw-ai/openclawai. It sought to pass as OpenClaw software. OpenClaw resources on NMP are abundant, just as they are on GitHub and other platforms that users trust. 

A search for OpenClaw AI on NMP throws back over 1,000 packages.
A search for OpenClaw AI on NMP throws back over 1,000 packages. Image: Screenshot, Moonlock.

The package contained code that deployed “a multi-stage infection chain.” This technique avoids the downloading of large standalone files. Internally, the developers of the malware are calling this macOS stealer GhostLoader. Another macOS stealer that uses this multi-stage technique instead of presenting users with an all-in-one file is MacSync

GhostLoader can steal your system credentials, browser data, crypto wallets, SSH keys, Apple Keychain databases, iMessage history, and more, according to JFrog Security research. It also goes after developer cloud accounts like AWS and Azure, and steals agentic AI platform credentials.

GhostLoader also comes with a backdoor. “It installs a persistent RAT with full remote access capabilities, including a SOCKS5 proxy and live browser session cloning,” JFrog Security said. 

For a fully detailed, technical report on GhostLoader, check out the JFrog digital forensics report

Cybercriminals are going for the “technical AI look” to trick you into installing malware 

One of the interesting elements in this new threat to Mac users is the user interface design. It appears to have been created to target a rather niche group and present the malware as legitimate, advanced AI software. 

JFrog Security shared a screenshot showing the design of the user interface that installs GhostLoader.
JFrog Security shared a screenshot showing the design of the user interface that installs GhostLoader. Image: Screenshot, Moonlock.

By giving malicious digital resources an “advanced, technical AI vibe and look,” cybercriminals can trick a variety of users. Victims may range from the tech-savvy user who is used to working with these types of developer-style resources, all the way down to the average user, who might think, “This must be how AI software is installed.” 

System password, FDA access, Cloud, and Agentic Credentials: Other notable elements of GhostLoader

Another notable element of the malware GhostLoader is how it prompts users for their system password. This technique is common with other stealers. Additionally, this multi-stage payload malware also asks users for full disk access. 

“The polished, fake CLI installer and Keychain prompt are convincing enough to extract system passwords from cautious developers, and once captured, those credentials unlock macOS Keychain decryption and browser credential extraction that would otherwise be blocked by OS-level protections,” JFrog Security said. 

A screenshot shared by JFrog Security on the report. GhostLoader sends to Telegram a summary of all that it extracted.
A screenshot shared by JFrog Security on the report. GhostLoader sends to Telegram a summary of all that it extracted. Image: Screenshot, Moonlock.

Code analysis of the malware done by JFrog Security shows that GhostLoader is specifically coded to go after developer accounts like Amazon Web Services (AWS), Microsoft Azure, GitHub credentials, and Solana credentials. 

Code shared by JFrog Security shows that GhostLoader targets credentials from developers' accounts and agentic AI accounts.
Code shared by JFrog Security shows that GhostLoader targets credentials from developers’ accounts and agentic AI accounts. Image: Screenshot, Moonlock.

While we have seen stealers do this in the past, it is a clear sign that the cybercriminals in this campaign are hoping to breach top-level developers. What we haven’t seen before is that this stealer, according to JFrog Security, is also coded to extract the credentials (passwords) of AI agent accounts. 

How to stay safe from GhostLoader

Below are some tips and advice that can help you strengthen your security as the era of artificial intelligence and agentic AI pushes forward. 

Get the Moonlock app to flag suspicious files and activity 

The Moonlock app is designed to run in the background and check every file you interact with. If the app detects a suspicious file, it will move it to Quarantine and inform you of the potential threat. This gives you peace of mind to focus on your work and check suspicious files in Quarantine on your own time. There, you can learn more about the threats your Mac encountered and remove them completely. 

The Moonlock app will also check out your Mac security settings and suggest simple but effective changes that can raise the bar of your defenses to new heights. 

You can check out the Moonlock app for free with a 7-day trial.  

Moonlock Malware Scanner tab

Beware of fake AI and agentic AI tools

Agentic AI is on the cutting edge of technology, with breakthroughs in the sector affecting industries across the board. And cybercriminals and other types of hackers are well aware of this global tech trend.

Recent reports, like the one presented here by JFrog Security, show that users experimenting with or developing these new tools are seen by cybercriminals as high-value targets. Extra caution when engaging with AI and agentic tools online is recommended for everyone. 

Enable multi-factor authentication across all your accounts 

Stealers feed on passwords to escalate privileges and gain access, and seek passwords to break into your accounts. From email to crypto wallets and online accounts, make sure you have enabled MFA for all your accounts and use biometric or authentication apps to add additional layers of security. That way, even if cybercriminals do get your password, they can’t break in.  

Final thoughts 

Stealers coded to breach Mac devices continue to make headlines. Each new threat campaign brings new malware capabilities and novel social engineering techniques. Consequently, there is no one-stop solution to dealing with this threat.

However, by periodically keeping up with breaking Mac security news, learning what user behaviors cybercriminals are exploiting, and better understanding the technical elements of cybersecurity, you can balance innovation with safety against digital risks.

MoonLock Banner
Ray Fernandez

Ray Fernandez

Ray has been covering tech and cybersecurity for over 15 years. His work has appeared on TechRepublic, VentureBeat, Forbes, Entrepreneur, and the Microsoft Blog, among others.