Skip to main content

14 posts tagged with "Cybersecurity"

Cybersecurity threats and defenses

View all tags

OpenClaw's 'Lobster Fever' Became Web3's Biggest Security Wake-Up Call of 2026

· 11 min read
Dora Noda
Software Engineer

GitHub's fastest-rising repository in history just exposed over 135,000 vulnerable AI agents across 82 countries—and crypto users are the primary targets. Welcome to the OpenClaw security crisis, where Chinese tech giants racing to deploy AI gateways collided with a massive supply chain attack that's rewriting the rules for blockchain security.

The Viral Phenomenon That Became a Security Nightmare

In late January 2026, OpenClaw achieved something unprecedented: it gained over 20,000 GitHub stars in a single day, becoming the platform's fastest-growing open-source project ever. By March 2026, the AI assistant had amassed over 250,000 stars, with tech enthusiasts worldwide rushing to install what seemed like the future of personal AI.

Unlike cloud-based AI assistants, OpenClaw runs entirely on your computer with full access to your files, email, and applications. You can message it through WhatsApp, Telegram, or Discord, and it works 24/7—executing shell commands, browsing the web, sending emails, managing calendars, and taking actions across your digital life—all triggered by a casual message from your phone.

The pitch was irresistible: your own personal AI agent, running locally, always available, infinitely capable. The reality turned out to be far more dangerous.

135,000 Exposed Instances: The Scale of the Security Disaster

By February 2026, security researchers discovered a chilling fact: more than 135,000 OpenClaw instances were exposed on the public internet across 82 countries, with over 50,000 vulnerable to remote code execution. The cause? A fundamental security flaw in OpenClaw's default configuration.

OpenClaw binds by default to 0.0.0.0:18789, meaning it listens on all network interfaces including the public internet, rather than 127.0.0.1 (localhost only) as security best practices demand. For context, this is equivalent to leaving your front door wide open with a sign saying "enter freely"—except the door leads to your entire digital life.

The "ClawJacked" vulnerability made the situation even worse. Attackers could hijack your AI assistant simply by getting you to visit a malicious website. Once compromised, the attacker gains the same level of access as the AI agent itself: your files, credentials, browser data, and yes—your crypto wallets.

Security firms scrambled to understand the scope. Kaspersky, Bitsight, and Oasis Security all issued urgent warnings. The consensus was clear: OpenClaw represented a "security nightmare" involving critical remote code execution vulnerabilities, architectural weaknesses, and—most alarmingly—a large-scale supply chain poisoning campaign in its plugin marketplace.

ClawHavoc: The Supply Chain Attack Targeting Crypto Users

While researchers focused on OpenClaw's core vulnerabilities, a more insidious threat was unfolding in ClawHub—the marketplace designed to make it easy for users to find and install third-party "skills" (plugins) for their AI agents.

In February 2026, security researchers codenamed ClawHavoc discovered that out of 2,857 skills audited on ClawHub, 341 were malicious. By mid-February, as the marketplace grew to over 10,700 skills, the number of malicious skills had more than doubled to 824—and by some reports, reached as high as 1,184 malicious skills.

The attack mechanism was devastatingly clever:

  1. Fake prerequisites: 335 skills used fake installation requirements to trick users into downloading the Atomic macOS Stealer (AMOS) malware
  2. Platform-specific payloads: On Windows, users downloaded "openclaw-agent.zip" from compromised GitHub repositories; on macOS, installation scripts hosted at glot.io were copied directly into Terminal
  3. Sophisticated social engineering: Documentation convinced users to execute malicious commands under the guise of legitimate setup steps
  4. Unified infrastructure: All malicious skills shared the same command-and-control infrastructure, indicating a coordinated campaign

The primary targets? Crypto users.

The malware was designed to steal:

  • Exchange API keys
  • Wallet private keys
  • SSH credentials
  • Browser passwords
  • Crypto-specific data from Solana wallets and wallet trackers

Out of the malicious skills, 111 were explicitly crypto-focused tools, including Solana wallet integrations and cryptocurrency trackers. The attackers understood that crypto users—accustomed to installing browser extensions and wallet tools—would be the most lucrative targets for an AI agent supply chain attack.

The Chinese Tech Giant Deployment Race

While security researchers issued warnings, Chinese tech giants saw opportunity. In early March 2026, Tencent, Alibaba, ByteDance, JD.com, and Baidu all launched competing free OpenClaw installation campaigns, compressing a competitive scramble that typically takes months into just days.

The strategy was clear: use free deployments as customer acquisition, locking in users before commercial AI projects scale up. Each giant raced to become the "first infrastructure contact for the next generation of AI developers":

  • Tencent launched QClaw, integrating OpenClaw with WeChat so users could remotely control their laptops by sending commands via their phones
  • Alibaba Cloud rolled out support for OpenClaw across its platforms, connecting to its Qwen AI model series
  • ByteDance's Volcano Engine unveiled ArkClaw, an "out-of-the-box" version of OpenClaw

The irony was stark: as security researchers warned of 135,000 exposed instances and massive supply chain attacks, China's largest tech companies were actively promoting mass installation to millions of users. The collision between technological enthusiasm and security reality had never been more visible.

Web3's AI Agent Problem: When MCP Meets Crypto Wallets

The OpenClaw crisis exposed a deeper issue that Web3 builders can no longer ignore: AI agents are increasingly managing on-chain assets, and the security models are dangerously immature.

The Model Context Protocol (MCP)—the emerging standard for connecting AI agents to external systems—is becoming the gateway through which AI interacts with blockchains. MCP servers function as unified API gateways to the full Web3 stack, enabling AI agents to read blockchain data, prepare transactions, and execute on-chain actions.

Currently, most cryptocurrency MCP servers require configuration with a private key, creating a single point of failure. If an AI agent is compromised—as tens of thousands of OpenClaw instances were—the attacker gains direct access to funds.

Two competing security models are emerging:

1. Delegated Signing (User-Controlled)

AI agents prepare transactions, but the user retains exclusive control over signing. The private key never leaves the user's device. This is the most secure approach but limits agent autonomy.

2. Agent-Controlled Allowances

Agents have their own keys and receive an allowance to spend on behalf of users. Private keys are managed securely by the agent host, and spending is capped. This enables autonomous operation but requires trust in the host's security.

Neither model is widely adopted yet. Most crypto MCP implementations still use the dangerous "give the agent your private key" approach—exactly the scenario ClawHavoc attackers were counting on.

By 2026 estimates, 60% of crypto wallets will use agentic AI to manage portfolios, track transactions, and improve security. The industry is implementing Multi-Party Computation (MPC), account abstraction, biometric authentication, and encrypted local storage to secure these interactions. Standards like ERC-8004 (co-led by the Ethereum Foundation, MetaMask, and Google) are attempting to create verifiable identity and credit history for AI agents on-chain.

But OpenClaw proved these safeguards aren't in place yet—and attackers are already exploiting the gap.

NVIDIA's Enterprise Answer: NemoClaw at GTC 2026

As the OpenClaw security crisis unfolded, NVIDIA saw an opening. At GTC 2026 in mid-March, the company announced NemoClaw, an open-source AI agent platform specifically designed for enterprise automation with security and privacy built in from the ground up.

Unlike OpenClaw's consumer-first, install-anywhere approach, NemoClaw targets businesses with:

  • Built-in security and privacy tools addressing the vulnerabilities that plagued OpenClaw
  • Enterprise authentication and access controls preventing the "open to the internet" default configuration disaster
  • Multi-platform support that runs beyond just NVIDIA chips, leveraging the company's NeMo, Nemotron, and Cosmos AI frameworks
  • Partnership ecosystem including talks with Salesforce, Google, Cisco, Adobe, and CrowdStrike

The timing couldn't be more strategic. As OpenClaw's "Lobster Fever" exposed the dangers of consumer-focused AI agents, NVIDIA positioned NemoClaw as the secure, enterprise-grade alternative—potentially challenging OpenAI in the business AI agent market.

For Web3 companies building AI-integrated infrastructure, NemoClaw represents a potential solution to the security problems OpenClaw exposed: professionally managed, audited, and secured AI agent deployments that can safely interact with high-value blockchain assets.

The Wake-Up Call Web3 Needed

The OpenClaw crisis isn't just an AI security story—it's a blockchain infrastructure story.

Consider the implications:

  • 135,000+ exposed AI agents with potential access to crypto wallets
  • 1,184 malicious plugins specifically targeting cryptocurrency users
  • Five Chinese tech giants pushing millions of installations without adequate security review
  • 60% of crypto wallets projected to use AI agents by year-end
  • No widely adopted security standards for AI-blockchain interactions

This is Web3's "supply chain security moment"—comparable to the 2020 SolarWinds attack in TradFi or the 2016 DAO hack in crypto. It exposes a fundamental truth: as blockchain infrastructure becomes more powerful and automated, the attack surface expands exponentially.

The industry's response will define whether AI agents become a secure gateway to Web3 functionality or the largest vulnerability the space has ever seen. The choice between delegated signing models, agent allowances, MPC solutions, and account abstraction isn't just technical—it's existential.

What Web3 Builders Should Do Now

If you're building in Web3 and integrating AI agents—or planning to—here's the checklist:

  1. Audit your MCP server security: If you're requiring private keys for AI agent access, you're creating ClawHavoc-style attack vectors
  2. Implement delegated signing: Users should always retain exclusive control over transaction signing, even when AI prepares transactions
  3. Use allowance-based models for autonomous agents: If agents need to act independently, give them dedicated keys with strict spending limits
  4. Never install AI agents with default network configurations: Always bind to localhost (127.0.0.1) unless you have enterprise-grade authentication
  5. Treat AI agent marketplaces like app stores: Require code signing, security audits, and reputation systems before trusting third-party skills
  6. Educate users about AI agent risks: Most crypto users don't understand that an AI agent is functionally equivalent to giving someone root access to their computer

The OpenClaw crisis taught us that security-by-default matters more than features. The race to deploy AI agents can't outpace the race to secure them.

Building blockchain infrastructure that connects to AI agents? BlockEden.xyz provides enterprise-grade API infrastructure for over 40 blockchains with security-first architecture designed for high-stakes integrations. Explore our services to build on foundations designed to last.


Sources:

Bybit's $1.5B Hack One Year Later: 88% Traceable, Only 3% Frozen — What Went Wrong

· 10 min read
Dora Noda
Software Engineer

On February 21, 2025, North Korea's Lazarus Group executed the largest cryptocurrency theft in history — $1.5 billion in Ethereum drained from Bybit's cold wallet in a single transaction. One year later, the numbers tell a sobering story: while blockchain analytics firms initially tracked 88.87% of the stolen funds, only 3.54% has been frozen. The rest sits in thousands of wallets, waiting.

This is not just a heist story. It is a case study in how a nation-state hacking operation outmaneuvered an entire industry's security infrastructure, and what the crypto world learned — and failed to learn — in the twelve months since.

AI Smart Contract Audit Arms Race: Purpose-Built Security AI Detects 92% of DeFi Exploits

· 7 min read
Dora Noda
Software Engineer

For $1.22 per contract, an AI agent can now scan a smart contract for exploitable vulnerabilities — and offensive exploit capabilities are doubling every 1.3 months. Welcome to the most consequential arms race in decentralized finance.

In February 2026, OpenAI and Paradigm jointly launched EVMbench, an open-source benchmark evaluating how effectively AI agents detect, patch, and exploit smart contract vulnerabilities. The results were sobering. GPT-5.3-Codex successfully exploited 72.2% of known vulnerable contracts, up from 31.9% just six months earlier. Meanwhile, a purpose-built AI security agent detected vulnerabilities in 92% of 90 exploited DeFi contracts worth $96.8 million — nearly three times the 34% detection rate of a baseline GPT-5.1 coding agent.

The implication is clear: the battle for DeFi security has become an AI-versus-AI contest, and the economics overwhelmingly favor attackers — for now.

Fake CEOs on Zoom: How North Korea's Deepfake Campaigns Are Draining Crypto Wallets

· 8 min read
Dora Noda
Software Engineer

A Polygon co-founder discovers strangers asking if he is really on a Zoom call with them. A BTC Prague organizer watches a convincing AI-generated replica of a well-known crypto CEO appear on screen, only to be asked to run a "quick audio fix." An AI startup founder avoids infection by insisting on Google Meet — and the attackers vanish. These are not scenes from a cyberpunk thriller. They happened in early 2026, and they share a common thread: North Korea's rapidly evolving deepfake social engineering machine.

Quantum Threats and the Future of Blockchain Security: Naoris Protocol's Pioneering Approach

· 9 min read
Dora Noda
Software Engineer

Roughly 6.26 million Bitcoin—valued between $650 billion and $750 billion—sit in addresses vulnerable to quantum attack. While most experts agree that cryptographically relevant quantum computers remain years away, the infrastructure needed to protect those assets can't be built overnight. One protocol claims it already has the answer, and the SEC agrees.

Naoris Protocol became the first decentralized security protocol cited in a U.S. regulatory document when the SEC's Post-Quantum Financial Infrastructure Framework (PQFIF) designated it as a reference model for quantum-safe blockchain infrastructure. With mainnet launching before Q1 2026 ends, 104 million post-quantum transactions already processed in testnet, and partnerships spanning NATO-aligned institutions, Naoris represents a radical bet: that DePIN's next frontier isn't compute or storage—it's cybersecurity itself.

Cold Wallet Security Crisis: How Lazarus Group's Month-Long Preparation Attacks Are Defeating Crypto's Strongest Defenses

· 9 min read
Dora Noda
Software Engineer

Your cold wallet is not as safe as you think. In 2025, infrastructure attacks — targeting private keys, wallet systems, and the humans who manage them — accounted for 76% of all stolen cryptocurrency, totaling $2.2 billion across just 45 incidents. The Lazarus Group, North Korea's state-sponsored hacking unit, has perfected a playbook that renders traditional cold storage security almost meaningless: month-long infiltration campaigns that target the people, not the code.

The Lazarus Group Playbook: Inside North Korea's $6.75B All-Time Crypto Theft Operation

· 10 min read
Dora Noda
Software Engineer

When Safe{Wallet} developer "Developer1" received what appeared to be a routine request on February 4, 2025, they had no idea their Apple MacBook would become the entry point for the largest cryptocurrency heist in history. Within seventeen days, North Korea's Lazarus Group would exploit that single compromised laptop to steal $1.5 billion from Bybit—more than the entire GDP of some nations.

This wasn't an aberration. It was the culmination of a decade-long evolution that transformed a group of state-sponsored hackers into the world's most sophisticated cryptocurrency thieves, responsible for at least $6.75 billion in cumulative theft.

The Lazarus Group's $3.4 Billion Crypto Heist: A New Era of State-Sponsored Cybercrime

· 8 min read
Dora Noda
Software Engineer

The numbers are staggering: $3.4 billion stolen from cryptocurrency platforms in 2025, with a single nation-state responsible for nearly two-thirds of the haul. North Korea's Lazarus Group didn't just break records—they rewrote the rulebook on state-sponsored cybercrime, executing fewer attacks while extracting exponentially more value. As we enter 2026, the cryptocurrency industry faces an uncomfortable truth: the security paradigms of the past five years are fundamentally broken.

The $3.4 Billion Wake-Up Call

Blockchain intelligence firm Chainalysis released its annual crypto crime report in December 2025, confirming what industry insiders had feared. Total cryptocurrency theft reached $3.4 billion, with North Korean hackers claiming $2.02 billion—a 51% increase over 2024's already-record $1.34 billion. This brings the DPRK's all-time cryptocurrency theft total to approximately $6.75 billion.

What makes 2025's theft unprecedented isn't just the dollar figure. It's the efficiency. North Korean hackers achieved this record haul through 74% fewer known attacks than previous years. The Lazarus Group has evolved from a scattered threat actor into a precision instrument of financial warfare.

TRM Labs and Chainalysis both independently verified these figures, with TRM noting that crypto crime has become "more organized and professionalized" than ever before. Attacks are faster, better coordinated, and far easier to scale than in previous cycles.

The Bybit Heist: A Masterclass in Supply Chain Attacks

On February 21, 2025, the cryptocurrency world witnessed its largest single theft in history. Hackers drained approximately 401,000 ETH—worth $1.5 billion at the time—from Bybit, one of the world's largest cryptocurrency exchanges.

The attack wasn't a brute-force breach or a smart contract exploit. It was a masterful supply chain compromise. The Lazarus Group—operating under the alias "TraderTraitor" (also known as Jade Sleet and Slow Pisces)—targeted a developer at Safe{Wallet}, the popular multi-signature wallet provider. By injecting malicious code into the wallet's user interface, they bypassed traditional security layers entirely.

Within 11 days, the hackers had laundered 100% of the stolen funds. Bybit CEO Ben Zhou revealed in early March that they had lost track of nearly $300 million. The FBI officially attributed the attack to North Korea on February 26, 2025, but by then, the funds had already disappeared into mixing protocols and bridge services.

The Bybit hack alone accounted for 74% of North Korea's 2025 cryptocurrency theft and demonstrated a chilling evolution in tactics. As security firm Hacken noted, the Lazarus Group showed "clear preferences for Chinese-language money laundering services, bridge services, and mixing protocols, with a 45-day laundering cycle following major thefts."

The Lazarus Playbook: From Phishing to Deep Infiltration

North Korea's cyber operations have undergone a fundamental transformation. Gone are the days of simple phishing attacks and hot wallet compromises. The Lazarus Group has developed a multi-pronged strategy that makes detection nearly impossible.

The Wagemole Strategy

Perhaps the most insidious tactic is what researchers call "Wagemole"—embedding covert IT workers inside cryptocurrency companies worldwide. Under false identities or through front companies, these operatives gain legitimate access to corporate systems, including crypto firms, custodians, and Web3 platforms.

This approach enables hackers to bypass perimeter defenses entirely. They're not breaking in—they're already inside.

AI-Powered Exploitation

In 2025, state-sponsored groups began using artificial intelligence to supercharge every stage of their operations. AI now scans thousands of smart contracts in minutes, identifies exploitable code, and automates multi-chain attacks. What once required weeks of manual analysis now takes hours.

Coinpedia's analysis revealed that North Korean hackers have redefined crypto crime through AI integration, making their operations more scalable and harder to detect than ever before.

Executive Impersonation

The shift from pure technical exploits to human-factor attacks was a defining trend of 2025. Security firms noted that "outlier losses were overwhelmingly due to access-control failures, not to novel on-chain math." Hackers moved from poisoned frontends and multisig UI tricks to executive impersonation and key theft.

Beyond Bybit: The 2025 Hack Landscape

While Bybit dominated headlines, North Korea's operations extended far beyond a single target:

  • DMM Bitcoin (Japan): $305 million stolen, contributing to the eventual wind-down of the exchange
  • WazirX (India): $235 million drained from India's largest cryptocurrency exchange
  • Upbit (South Korea): $36 million seized through signing infrastructure exploitation in late 2025

These weren't isolated incidents—they represented a coordinated campaign targeting centralized exchanges, decentralized finance platforms, and individual wallet providers across multiple jurisdictions.

Independent tallies identified over 300 major security incidents throughout the year, highlighting systemic vulnerabilities across the entire cryptocurrency ecosystem.

The Huione Connection: Cambodia's $4 Billion Laundering Machine

On the money laundering side, U.S. Treasury's Financial Crimes Enforcement Network (FinCEN) identified a critical node in North Korea's operations: Cambodia-based Huione Group.

FinCEN found that Huione Group laundered at least $4 billion in illicit proceeds between August 2021 and January 2025. Blockchain firm Elliptic estimates the true figure may be closer to $11 billion.

The Treasury's investigation revealed that Huione Group processed $37 million linked directly to the Lazarus Group, including $35 million from the DMM Bitcoin hack. The company worked directly with North Korea's Reconnaissance General Bureau, Pyongyang's primary foreign intelligence organization.

What made Huione particularly dangerous was its complete lack of compliance controls. None of its three business components—Huione Pay (banking), Huione Guarantee (escrow), and Huione Crypto (exchange)—had published AML/KYC policies.

The company's connections to Cambodia's ruling Hun family, including Prime Minister Hun Manet's cousin as a major shareholder, complicated international enforcement efforts until the U.S. moved to sever its access to the American financial system in May 2025.

The Regulatory Response: MiCA, PoR, and Beyond

The scale of 2025's theft has accelerated regulatory action worldwide.

Europe's MiCA Stage 2

The European Union fast-tracked "Stage 2" of the Markets in Crypto-Assets (MiCA) regulation, now mandating quarterly audits of third-party software vendors for any exchange operating in the Eurozone. The Bybit hack's supply chain attack vector drove this specific requirement.

U.S. Proof-of-Reserves Mandates

In the United States, the focus has shifted toward mandatory, real-time Proof-of-Reserves (PoR) requirements. The theory: if exchanges must prove their assets on-chain in real-time, suspicious outflows become immediately visible.

South Korea's Digital Financial Security Act

Following the Upbit hack, South Korea's Financial Services Commission proposed the "Digital Financial Security Act" in December 2025. The Act would enforce mandated cold storage ratios, routine penetration testing, and enhanced monitoring for suspicious activities across all cryptocurrency exchanges.

What 2026 Defenses Need

The Bybit breach forced a fundamental shift in how centralized exchanges manage security. Industry leaders have identified several critical upgrades for 2026:

Multi-Party Computation (MPC) Migration

Most top-tier platforms have migrated from traditional smart-contract multi-sigs to Multi-Party Computation technology. Unlike the Safe{Wallet} setup exploited in 2025, MPC splits private keys into shards that never exist in a single location, making UI-spoofing and "Ice Phishing" techniques nearly impossible to execute.

Cold Storage Standards

Reputable custodial exchanges now implement 90-95% cold storage ratios, keeping the vast majority of user funds offline in hardware security modules. Multi-signature wallets require multiple authorized parties to approve large transactions.

Supply Chain Auditing

The key takeaway from 2025 is that security extends beyond the blockchain to the entire software stack. Exchanges must audit their vendor relationships with the same rigor they apply to their own code. The Bybit hack succeeded because of compromised third-party infrastructure, not exchange vulnerabilities.

Human Factor Defense

Continuous training regarding phishing attempts and safe password practices has become mandatory, as human error remains a primary cause of breaches. Security experts recommend periodic red and blue team exercises to identify weaknesses in security process management.

Quantum-Resistant Upgrades

Looking further ahead, post-quantum cryptography (PQC) and quantum-secured hardware are emerging as critical future defenses. The cold wallet market's projected 15.2% CAGR from 2026 to 2033 reflects institutional confidence in security evolution.

The Road Ahead

Chainalysis's closing warning in its 2025 report should resonate across the industry: "The country's record-breaking 2025 performance—achieved with 74 percent fewer known attacks—suggests we may be seeing only the most visible portion of its activities. The challenge for 2026 will be detecting and preventing these high-impact operations before DPRK-affiliated actors inflict another Bybit-scale incident."

North Korea has proven that state-sponsored hackers can outpace industry defenses when motivated by sanctions evasion and weapons funding. The $6.75 billion cumulative total represents not just stolen cryptocurrency—it represents missiles, nuclear programs, and regime survival.

For the cryptocurrency industry, 2026 must be the year of security transformation. Not incremental improvements, but fundamental rearchitecting of how assets are stored, accessed, and transferred. The Lazarus Group has shown that yesterday's best practices are today's vulnerabilities.

The stakes have never been higher.


Securing blockchain infrastructure requires constant vigilance and industry-leading security practices. BlockEden.xyz provides enterprise-grade node infrastructure with multi-layer security architecture, helping developers and businesses build on foundations designed to withstand evolving threats.

The $82 Billion Shadow Economy: How Professional Crypto Laundering Networks Became the Backbone of Global Crime

· 10 min read
Dora Noda
Software Engineer

Cryptocurrency money laundering has exploded to $82 billion in 2025—an eightfold increase from $10 billion just five years earlier. But the real story isn't the staggering sum. It's the industrialization of financial crime itself. Professional laundering networks now process $44 million daily across sophisticated Telegram-based marketplaces, North Korea has weaponized crypto theft to fund nuclear programs, and the infrastructure enabling global scams has grown 7,325 times faster than legitimate crypto adoption. The era of amateur crypto criminals is over. We've entered the age of organized, professionalized blockchain crime.