Malware Distribution via Hugging Face and ClawHub
Threat actors are using social engineering to distribute malware via AI distribution platforms such as Hugging Face and ClawHub by tricking users into downloading malicious files, which leads to malware infections on Windows, macOS, Linux, and Android systems.
Threat actors are leveraging AI distribution platforms like Hugging Face and ClawHub to distribute malware. This involves social engineering tactics to deceive users into downloading files that contain malicious code. Instead of directly compromising AI agents, the attackers abuse user trust by injecting indirect prompts into resources that the AI accesses. Acronis reported that on ClawHub, nearly 600 malicious skills across 13 developer accounts were identified distributing trojans, cryptominers, and information stealers targeting both Windows and macOS. On Hugging Face, attackers created repositories hosting malicious files designed to stage multi-step infection chains leading to infostealers, trojans, malware loaders, and other types of malware targeting Windows, Linux, and Android. This tactic allows attackers to bypass traditional security measures and leverage the platforms’ reputation for trusted AI tooling.
Attack Chain
- Attacker creates a malicious repository or skill on Hugging Face or ClawHub.
- The repository or skill contains files that appear legitimate but include malicious code.
- The attacker uses social engineering to entice users to download the files.
- Upon execution, the malicious code fetches additional payloads from external sources.
- For macOS, the payload can be Atomic macOS Stealer (AMOS) Stealer.
- The downloaded payload executes commands to install hidden dependencies.
- The malware establishes persistence on the victim’s system.
- The malware performs its intended malicious actions, such as stealing information or mining cryptocurrency.
Impact
Successful attacks can lead to the installation of various types of malware, including infostealers, trojans, cryptominers, and malware loaders. The targeted platforms include Windows, macOS, Linux, and Android, potentially impacting a wide range of users and systems. The abuse of trust in AI distribution platforms poses a significant risk, as users may be less likely to scrutinize files from these sources. Acronis identified close to 600 malicious skills on ClawHub alone, indicating the scale of this threat.
Recommendation
- Monitor process creation events for execution of downloaded files from Hugging Face or ClawHub with unusual parent processes using the “Detect Suspicious Process Execution from AI Platforms” Sigma rule.
- Implement network monitoring to detect connections to known malicious domains or IPs associated with malware distribution campaigns that originate from processes associated with AI platform tooling.
- Educate users about the risks of downloading files from untrusted sources, even on trusted platforms like Hugging Face and ClawHub.
- Regularly scan systems for known malware signatures and indicators of compromise associated with infostealers and trojans.
Detection coverage 2
Detect Suspicious Process Execution from AI Platforms
highDetects suspicious process executions originating from downloaded files from AI platforms like Hugging Face or ClawHub, indicating potential malware activity.
Detect Suspicious macOS Process Execution from AI Platforms
highDetects suspicious process executions originating from downloaded files from AI platforms like Hugging Face or ClawHub on macOS, indicating potential malware activity.
Detection queries are kept inside the platform. Get full rules →