Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
19 Indlæg 13 Posters 1 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • sempf@infosec.exchangeS sempf@infosec.exchange

    @mttaggart Seeing as how OpenClaw is doing nothing except expressly, in its mind anyway, performing the requests of a user under that user's permissions using that user's tools, how exactly would you recommend we prevent it on enterprise networks?

    That reads kind of snarky, and it isn't. It's an honest question. I just got it from a customer.

    mttaggart@infosec.exchangeM This user is from outside of this forum
    mttaggart@infosec.exchangeM This user is from outside of this forum
    mttaggart@infosec.exchange
    wrote sidst redigeret af
    #5

    @Sempf Without chasing down binary hashes, this is the best I've found for detection/remediation: https://github.com/knostic/openclaw-detect

    sempf@infosec.exchangeS G fritzadalis@infosec.exchangeF 3 Replies Last reply
    0
    • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

      OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

      Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

      https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

      katzenberger@tldr.nettime.orgK This user is from outside of this forum
      katzenberger@tldr.nettime.orgK This user is from outside of this forum
      katzenberger@tldr.nettime.org
      wrote sidst redigeret af
      #6

      @mttaggart

      »Got overconfident because this workflow had been working on my toy inbox for weeks.«

      "toy inbox" and "weeks" sound quite odd here, when used together.

      1 Reply Last reply
      0
      • sempf@infosec.exchangeS sempf@infosec.exchange

        @mttaggart Seeing as how OpenClaw is doing nothing except expressly, in its mind anyway, performing the requests of a user under that user's permissions using that user's tools, how exactly would you recommend we prevent it on enterprise networks?

        That reads kind of snarky, and it isn't. It's an honest question. I just got it from a customer.

        G This user is from outside of this forum
        G This user is from outside of this forum
        glitzersachen@hachyderm.io
        wrote sidst redigeret af
        #7

        @Sempf @mttaggart

        Resistance. In the end, since their lordships cannot be bothered to understand that their knew shiny is actually hell spawn, the only thing that can be done is resistance.

        Until the bubble bursts (my expectation is, we'll have to hold it up for at most 6-10 months, then the shady financing around OpenAI will unravel and suck every business model based on AI into the abyss).

        1 Reply Last reply
        0
        • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

          @Sempf Without chasing down binary hashes, this is the best I've found for detection/remediation: https://github.com/knostic/openclaw-detect

          sempf@infosec.exchangeS This user is from outside of this forum
          sempf@infosec.exchangeS This user is from outside of this forum
          sempf@infosec.exchange
          wrote sidst redigeret af
          #8

          @mttaggart Wow. Ok I'll take a look, thank you. Many concerned folx.

          1 Reply Last reply
          0
          • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

            @Sempf Without chasing down binary hashes, this is the best I've found for detection/remediation: https://github.com/knostic/openclaw-detect

            G This user is from outside of this forum
            G This user is from outside of this forum
            glitzersachen@hachyderm.io
            wrote sidst redigeret af
            #9

            @mttaggart @Sempf

            Oh, I see, @Sempf was about detecting it.

            From what I see, the answer is, if you implement ISO 27001 you'd have to introduce managed machines anyway, meaning you can prevent admin access by users and always pull a software inventory from the machines under your rule.

            There is various software to support this.

            1 Reply Last reply
            0
            • sempf@infosec.exchangeS sempf@infosec.exchange

              @mttaggart Seeing as how OpenClaw is doing nothing except expressly, in its mind anyway, performing the requests of a user under that user's permissions using that user's tools, how exactly would you recommend we prevent it on enterprise networks?

              That reads kind of snarky, and it isn't. It's an honest question. I just got it from a customer.

              skaverat@skaverat.netS This user is from outside of this forum
              skaverat@skaverat.netS This user is from outside of this forum
              skaverat@skaverat.net
              wrote sidst redigeret af
              #10

              @Sempf @mttaggart

              > how exactly would you recommend we prevent it on enterprise networks?

              As LLMs are by nature not deterministic, the only way is to not use it

              1 Reply Last reply
              0
              • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                @Sempf Without chasing down binary hashes, this is the best I've found for detection/remediation: https://github.com/knostic/openclaw-detect

                fritzadalis@infosec.exchangeF This user is from outside of this forum
                fritzadalis@infosec.exchangeF This user is from outside of this forum
                fritzadalis@infosec.exchange
                wrote sidst redigeret af
                #11

                @mttaggart @Sempf
                Hm, a lot of this could be detected with Sentinel...

                mttaggart@infosec.exchangeM 1 Reply Last reply
                0
                • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

                  @mttaggart @Sempf
                  Hm, a lot of this could be detected with Sentinel...

                  mttaggart@infosec.exchangeM This user is from outside of this forum
                  mttaggart@infosec.exchangeM This user is from outside of this forum
                  mttaggart@infosec.exchange
                  wrote sidst redigeret af
                  #12

                  @FritzAdalis @Sempf Tanium too, methinks. The easiest tell is the openclaw folder, which is created regardless of install method.

                  The network detections are rough. 18789/tcp has a lot of false positives, and also the modern installation is not open by default. It also can use Tailscale for exposure, so you'll see Wireguard traffic, but not OpenClaw.

                  fritzadalis@infosec.exchangeF 1 Reply Last reply
                  0
                  • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                    @FritzAdalis @Sempf Tanium too, methinks. The easiest tell is the openclaw folder, which is created regardless of install method.

                    The network detections are rough. 18789/tcp has a lot of false positives, and also the modern installation is not open by default. It also can use Tailscale for exposure, so you'll see Wireguard traffic, but not OpenClaw.

                    fritzadalis@infosec.exchangeF This user is from outside of this forum
                    fritzadalis@infosec.exchangeF This user is from outside of this forum
                    fritzadalis@infosec.exchange
                    wrote sidst redigeret af
                    #13

                    @mttaggart @Sempf
                    Well the clients are instrumented with Defender, so if e.g. 18789/tcp is open I can see which procees. Or I could run the script with Intune, but I already have the data.

                    mttaggart@infosec.exchangeM 1 Reply Last reply
                    0
                    • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                      OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

                      Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

                      https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

                      tehfishman@ioc.exchangeT This user is from outside of this forum
                      tehfishman@ioc.exchangeT This user is from outside of this forum
                      tehfishman@ioc.exchange
                      wrote sidst redigeret af
                      #14

                      @mttaggart to highlight how absurd this is, a collection of synonymous scenarios:

                      Head Linux administrator accidentally runs `rm -rf /`
                      Lead DBA accidentally drops production database
                      Secretary of HHS takes up scientifically dubious fad diet (whoops)
                      Safe driving instructor gets license revoked after multiple DUI

                      1 Reply Last reply
                      0
                      • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

                        @mttaggart @Sempf
                        Well the clients are instrumented with Defender, so if e.g. 18789/tcp is open I can see which procees. Or I could run the script with Intune, but I already have the data.

                        mttaggart@infosec.exchangeM This user is from outside of this forum
                        mttaggart@infosec.exchangeM This user is from outside of this forum
                        mttaggart@infosec.exchange
                        wrote sidst redigeret af
                        #15

                        @FritzAdalis @Sempf That's just the default though, and shouldn't be the only check. Luckily, since openclaw is the binary, you can also just look for process creation.

                        badsamurai@infosec.exchangeB 1 Reply Last reply
                        0
                        • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                          @FritzAdalis @Sempf That's just the default though, and shouldn't be the only check. Luckily, since openclaw is the binary, you can also just look for process creation.

                          badsamurai@infosec.exchangeB This user is from outside of this forum
                          badsamurai@infosec.exchangeB This user is from outside of this forum
                          badsamurai@infosec.exchange
                          wrote sidst redigeret af
                          #16

                          @mttaggart @FritzAdalis @Sempf if you’re a Tenable shop, they have a plugin as well. Not as active as a network or endpoint detection, but it’s a common thing many of us already have and sending to our SIEMs. Auto-contain that shit.

                          https://www.tenable.com/plugins/nessus/297108

                          1 Reply Last reply
                          0
                          • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                            OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

                            Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

                            https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

                            thomasjwebb@mastodon.socialT This user is from outside of this forum
                            thomasjwebb@mastodon.socialT This user is from outside of this forum
                            thomasjwebb@mastodon.social
                            wrote sidst redigeret af
                            #17

                            @mttaggart the whole point of automation should be to work around the fact that humans make mistakes, not to place landmines on all the places people make mistakes. I think this tech is being embraced by the same kind of people who didn't immediately have alarms going off in their head about cloud IoT products.

                            1 Reply Last reply
                            0
                            • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                              OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

                              Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

                              https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

                              rpardee@hachyderm.ioR This user is from outside of this forum
                              rpardee@hachyderm.ioR This user is from outside of this forum
                              rpardee@hachyderm.io
                              wrote sidst redigeret af
                              #18

                              @mttaggart Over here giggling like a maniac reading this shit...

                              1 Reply Last reply
                              0
                              • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                                OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

                                Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

                                https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

                                greatbigtable@mastodon.socialG This user is from outside of this forum
                                greatbigtable@mastodon.socialG This user is from outside of this forum
                                greatbigtable@mastodon.social
                                wrote sidst redigeret af
                                #19

                                @mttaggart When will they learn that "instructing" an AI agent is not the same as programming an automation routine.

                                One is deterministic and one is most decidedly NOT!

                                You can get bad results with programming; GIGO after all. However, you can never be 100% sure what you're going to get from probabilistic AI.

                                It's a version of the problem expressed in Zack Korman's video about scanning AI bot skills for security. Even if you get it mostly right, the gap's the problem.

                                https://www.youtube.com/watch?v=GOzUIlgAcjY

                                1 Reply Last reply
                                0
                                • tanyakaroli@expressional.socialT tanyakaroli@expressional.social shared this topic
                                Svar
                                • Svar som emne
                                Login for at svare
                                • Ældste til nyeste
                                • Nyeste til ældste
                                • Most Votes


                                • Log ind

                                • Har du ikke en konto? Tilmeld

                                • Login or register to search.
                                Powered by NodeBB Contributors
                                Graciously hosted by data.coop
                                • First post
                                  Last post
                                0
                                • Hjem
                                • Seneste
                                • Etiketter
                                • Populære
                                • Verden
                                • Bruger
                                • Grupper