Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
19 Indlæg 13 Posters 1 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    @Sempf Without chasing down binary hashes, this is the best I've found for detection/remediation: https://github.com/knostic/openclaw-detect

    sempf@infosec.exchangeS This user is from outside of this forum
    sempf@infosec.exchangeS This user is from outside of this forum
    sempf@infosec.exchange
    wrote sidst redigeret af
    #8

    @mttaggart Wow. Ok I'll take a look, thank you. Many concerned folx.

    1 Reply Last reply
    0
    • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

      @Sempf Without chasing down binary hashes, this is the best I've found for detection/remediation: https://github.com/knostic/openclaw-detect

      G This user is from outside of this forum
      G This user is from outside of this forum
      glitzersachen@hachyderm.io
      wrote sidst redigeret af
      #9

      @mttaggart @Sempf

      Oh, I see, @Sempf was about detecting it.

      From what I see, the answer is, if you implement ISO 27001 you'd have to introduce managed machines anyway, meaning you can prevent admin access by users and always pull a software inventory from the machines under your rule.

      There is various software to support this.

      1 Reply Last reply
      0
      • sempf@infosec.exchangeS sempf@infosec.exchange

        @mttaggart Seeing as how OpenClaw is doing nothing except expressly, in its mind anyway, performing the requests of a user under that user's permissions using that user's tools, how exactly would you recommend we prevent it on enterprise networks?

        That reads kind of snarky, and it isn't. It's an honest question. I just got it from a customer.

        skaverat@skaverat.netS This user is from outside of this forum
        skaverat@skaverat.netS This user is from outside of this forum
        skaverat@skaverat.net
        wrote sidst redigeret af
        #10

        @Sempf @mttaggart

        > how exactly would you recommend we prevent it on enterprise networks?

        As LLMs are by nature not deterministic, the only way is to not use it

        1 Reply Last reply
        0
        • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

          @Sempf Without chasing down binary hashes, this is the best I've found for detection/remediation: https://github.com/knostic/openclaw-detect

          fritzadalis@infosec.exchangeF This user is from outside of this forum
          fritzadalis@infosec.exchangeF This user is from outside of this forum
          fritzadalis@infosec.exchange
          wrote sidst redigeret af
          #11

          @mttaggart @Sempf
          Hm, a lot of this could be detected with Sentinel...

          mttaggart@infosec.exchangeM 1 Reply Last reply
          0
          • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

            @mttaggart @Sempf
            Hm, a lot of this could be detected with Sentinel...

            mttaggart@infosec.exchangeM This user is from outside of this forum
            mttaggart@infosec.exchangeM This user is from outside of this forum
            mttaggart@infosec.exchange
            wrote sidst redigeret af
            #12

            @FritzAdalis @Sempf Tanium too, methinks. The easiest tell is the openclaw folder, which is created regardless of install method.

            The network detections are rough. 18789/tcp has a lot of false positives, and also the modern installation is not open by default. It also can use Tailscale for exposure, so you'll see Wireguard traffic, but not OpenClaw.

            fritzadalis@infosec.exchangeF 1 Reply Last reply
            0
            • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

              @FritzAdalis @Sempf Tanium too, methinks. The easiest tell is the openclaw folder, which is created regardless of install method.

              The network detections are rough. 18789/tcp has a lot of false positives, and also the modern installation is not open by default. It also can use Tailscale for exposure, so you'll see Wireguard traffic, but not OpenClaw.

              fritzadalis@infosec.exchangeF This user is from outside of this forum
              fritzadalis@infosec.exchangeF This user is from outside of this forum
              fritzadalis@infosec.exchange
              wrote sidst redigeret af
              #13

              @mttaggart @Sempf
              Well the clients are instrumented with Defender, so if e.g. 18789/tcp is open I can see which procees. Or I could run the script with Intune, but I already have the data.

              mttaggart@infosec.exchangeM 1 Reply Last reply
              0
              • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

                Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

                https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

                tehfishman@ioc.exchangeT This user is from outside of this forum
                tehfishman@ioc.exchangeT This user is from outside of this forum
                tehfishman@ioc.exchange
                wrote sidst redigeret af
                #14

                @mttaggart to highlight how absurd this is, a collection of synonymous scenarios:

                Head Linux administrator accidentally runs `rm -rf /`
                Lead DBA accidentally drops production database
                Secretary of HHS takes up scientifically dubious fad diet (whoops)
                Safe driving instructor gets license revoked after multiple DUI

                1 Reply Last reply
                0
                • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

                  @mttaggart @Sempf
                  Well the clients are instrumented with Defender, so if e.g. 18789/tcp is open I can see which procees. Or I could run the script with Intune, but I already have the data.

                  mttaggart@infosec.exchangeM This user is from outside of this forum
                  mttaggart@infosec.exchangeM This user is from outside of this forum
                  mttaggart@infosec.exchange
                  wrote sidst redigeret af
                  #15

                  @FritzAdalis @Sempf That's just the default though, and shouldn't be the only check. Luckily, since openclaw is the binary, you can also just look for process creation.

                  badsamurai@infosec.exchangeB 1 Reply Last reply
                  0
                  • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                    @FritzAdalis @Sempf That's just the default though, and shouldn't be the only check. Luckily, since openclaw is the binary, you can also just look for process creation.

                    badsamurai@infosec.exchangeB This user is from outside of this forum
                    badsamurai@infosec.exchangeB This user is from outside of this forum
                    badsamurai@infosec.exchange
                    wrote sidst redigeret af
                    #16

                    @mttaggart @FritzAdalis @Sempf if you’re a Tenable shop, they have a plugin as well. Not as active as a network or endpoint detection, but it’s a common thing many of us already have and sending to our SIEMs. Auto-contain that shit.

                    https://www.tenable.com/plugins/nessus/297108

                    1 Reply Last reply
                    0
                    • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                      OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

                      Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

                      https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

                      thomasjwebb@mastodon.socialT This user is from outside of this forum
                      thomasjwebb@mastodon.socialT This user is from outside of this forum
                      thomasjwebb@mastodon.social
                      wrote sidst redigeret af
                      #17

                      @mttaggart the whole point of automation should be to work around the fact that humans make mistakes, not to place landmines on all the places people make mistakes. I think this tech is being embraced by the same kind of people who didn't immediately have alarms going off in their head about cloud IoT products.

                      1 Reply Last reply
                      0
                      • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                        OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

                        Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

                        https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

                        rpardee@hachyderm.ioR This user is from outside of this forum
                        rpardee@hachyderm.ioR This user is from outside of this forum
                        rpardee@hachyderm.io
                        wrote sidst redigeret af
                        #18

                        @mttaggart Over here giggling like a maniac reading this shit...

                        1 Reply Last reply
                        0
                        • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                          OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

                          Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

                          https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

                          greatbigtable@mastodon.socialG This user is from outside of this forum
                          greatbigtable@mastodon.socialG This user is from outside of this forum
                          greatbigtable@mastodon.social
                          wrote sidst redigeret af
                          #19

                          @mttaggart When will they learn that "instructing" an AI agent is not the same as programming an automation routine.

                          One is deterministic and one is most decidedly NOT!

                          You can get bad results with programming; GIGO after all. However, you can never be 100% sure what you're going to get from probabilistic AI.

                          It's a version of the problem expressed in Zack Korman's video about scanning AI bot skills for security. Even if you get it mostly right, the gap's the problem.

                          https://www.youtube.com/watch?v=GOzUIlgAcjY

                          1 Reply Last reply
                          0
                          • tanyakaroli@expressional.socialT tanyakaroli@expressional.social shared this topic
                          Svar
                          • Svar som emne
                          Login for at svare
                          • Ældste til nyeste
                          • Nyeste til ældste
                          • Most Votes


                          • Log ind

                          • Har du ikke en konto? Tilmeld

                          • Login or register to search.
                          Powered by NodeBB Contributors
                          Graciously hosted by data.coop
                          • First post
                            Last post
                          0
                          • Hjem
                          • Seneste
                          • Etiketter
                          • Populære
                          • Verden
                          • Bruger
                          • Grupper