SpyCloud cybersecurity update for 2026 focusing on cybercrime trends and threat intelligence.

January Cybercrime Update: OpenClaw Chaos, Clone Wars, and Cl0p

Table of Contents

Check your exposure

New Year, new threats, as they say. Right?

We’re back with another cybercrime update – and this month we’re covering:

Let’s dig in.

OpenClaw can download Atomic macOS malware for you

OpenClaw (formerly called Clawdbot and Moltbot) is an open-sourced AI-based personal assistant that has been generating a lot of buzz since it was first released in November. It is designed to run locally on a user’s machine and access an online LLM for reasoning. It also requires significant permissions and a variety of user credentials in order to function as intended, raising significant red flags from both security researchers and AI experts.

OpenClaw has gone somewhat viral and rapidly amassed a large user base that are keen to share tools – one of the ways to do this is by sharing “skills” on ClawHub. In the context of OpenClaw, skills are basically markdown files that contain detailed instructions for an agent on how to execute a task, and ClawHub is the official registry for users to publish OpenClaw skills.

ClawHub skill dock interface showcasing cybersecurity tools and skills.
ClawHub homepage

Earlier this week, a few different security researchers appeared to simultaneously notice a wide variety of seemingly innocuous “skills” on ClawHub which actually contained instructions prompting agents to download Atomic macOS (AMOS) infostealer malware.

A researcher at 1Password noticed that the top downloaded skill on ClawHub, ostensibly related to a Twitter-related task, actually led to an install of Atomic Stealer. Researchers at Koi did a more wide-ranging analysis connecting 335 different seemingly harmless skills on ClawHub to downloads for AMOS malware and at least six others to different malicious results. (A preliminary analysis by our team shows an uptick of AMOS infections starting on January 22, 2026.) Finally, researchers at OpenSourceMalware identified malicious OpenClaw skills distributed across ClawHub as well as Github with the concealed purpose of distributing both macOS and Windows infostealer malware.

Some of these researchers correctly pointed out that this attack chain is functionally similar to past campaigns that trojanized extension or package marketplaces (like PyPi or npm). However, the fact that these tactics are popping up in marketplaces intended to be used for tasking autonomous agents feels like an escalation – the humans tasking these agents are likely optimizing for speed and ease-of-use and are almost certainly being less careful and taking less notice of small details. Additionally, it stands to reason that agents in some cases will probably be enabled to download their own new skills from skill marketplaces, completely removing any possibility of human review if these skills continue to frequently be trojanized.

The Forum Wars: The Clone Wars

Breachforums – the most popular English-language data breach and hacking forum – went down in April 2025. Since then, we have been tracking the chaotic aftermath, as a community of criminal hackers remains without a centralized forum to gather while a few opportunistic threat actors have attempted to fill the power vacuum.

Let’s dive into some of the latest developments in the “Forum Wars” saga:

Cybersecurity threat detection and prevention by SpyCloud.
The current logo displayed on Hasan’s version of BreachForums.

In the same week, both of these websites defaced each other – first Hasan defaced the revived “original” BreachForums site posting an image of his own face with the text “Breach Wars: Attack of the Clones” in the Star Wars font and a link to his own site. Then, the other BreachForums struck back, defacing Hasan’s site (allegedly through a cross-site scripting vulnerability in the XenForo forum management software) and leaving a message on their homepage that called them “a bunch of skids.”

Sci-fi game poster featuring a young male soldier and space background.
The “original” BreachForums website after it had been defaced by Hasan.
Hasan’s BF site after it was defaced by the owners of the “original” BreachForums.
Cybersecurity dashboard showing SpyCloud's threat intelligence platform.

The “original” restored RaidForums is now for sale.

SpyCloud cybersecurity platform showcasing data breach prevention solutions.

Another RaidForums clone is currently up and running.

SpyCloud cybersecurity platform showcasing data security and threat detection.

Leakbase’s most current announcement regarding their forum.

SpyCloud cybersecurity platform showing threat detection interface.

DarkForums’ announcement regarding their new domain after members noticed that their domain was unavailable.

Cybersecurity dashboard showing threat detection and data breach monitoring.

Members of the cybercrime community discussing all of the various forum outages.

RAMPwn

On January 28th, the threat actor going by the moniker stallman reported on two separate Russian-speaking forums that his passion project, RAMP (ramp4u[.]io) – a Russian-speaking cybercrime forum popular with ransomware groups and initial access brokers – had been seized by the FBI. Visiting the RAMP site itself led to a splash screen claiming such, alongside DNS redirection of the domains to the FBI’s seized name servers (fbi.seized.gov).

Stallman’s posts announcing a RAMP disruption.

The posts were met with both panic and skepticism, with one member pointing out that stallman had previously mentioned he has full physical control of the server. Cybersecurity analysts and news outlets have noted that while the splash page had the FBI’s logo, the U.S. Department of Justice has not yet made any public announcements about any enforcement actions targeting RAMP, causing some skepticism as to the authenticity of the takedown.

A post skeptical of stallman’s claims. It includes a screenshot of an older stallman post in which he stated he had full physical control over his server hardware.

Shortly after these takedown announcement posts were made, the administrator of Tor Zireael, a Telegram channel focused on anonymity, posted screenshots of data allegedly leaked from RAMP, again causing paranoia and moral panic. This Tor Zireael Telegram channel is linked to a YouTube channel of the same name which purports to be operated by a former Ukrainian cyber officer who now educates people on anonymity practices. It’s unclear whether the RAMP databases posted are real or in any way linked to the alleged law enforcement takedown action.

Messages from the Tor Zireael Telegram channel

Man analyzing cybersecurity threats with digital security icons and hacker imagery.

Tor Zireael YouTube profile

Other forums also took notice of the RAMP takedown, with Hasan even going so far as to invite former RAMP users to his forum with open arms.

Breach Forums Ransomware Takedown.

Hasan’s post about the RAMP takedown which welcomes ransomware actors to post on his version of BreachForums.

More Cl0p activity (likely from CentreStack victims)

Cl0p is a ransomware group known for their very effective pattern of mass exploitation of a zero-day vulnerability to compromise a specific internet-facing appliance en masse and then follow up with data theft extortion over the course of the next few months. In late January, they began posting a large volume of new claimed victims to their website, signaling the imminent release of stolen data from their newest batch of victims. Based on timing, many researchers suspect this newest round of victims is likely a result of their campaign against Gladinet CentreStack servers in mid-December.

Arrests of former Black Basta ransomware operators

Ukrainian and German officials raided the homes of two former members of the Black Basta Ransomware group and publicly identified a third – Oleg Evgenievich Nefedov – as tramp, the leader of the group. Black Basta was a prolific Ransomware gang made up of former members of the Conti Ransomware group. After Conti’s splintered in 2022, Black Basta was one of a few Russian Ransomware gangs made up of former Conti members. In early 2025, Black Basta appeared to cease activities after some internal strife and a large dataset of their internal chat logs leaked, a series of events that echoed the end of Conti just 3 years prior. It’s suspected that Black Basta members pivoted to other ransomware (such as CACTUS) following the dissolution of the Black Basta brand.

Expert profile image showcasing Oleg Evgenievich with professional credentials.

Wanted notice for Oleg Evgenievich NEFEDOV on EUROPOL’s ‘Most Wanted’ website.

New research and insights from SpyCloud

Chinese-speaking cybercriminals have developed scams, fraud, malware, and money laundering schemes tied to the Lunar New Year ‘red envelope’ tradition. 

Recaptured data numbers for January 2026

January monthly total

Total New Recaptured Data Records for January:
626,471,373

New third-party breach data this month

Third-Party Breaches Parsed and Ingested:
1,155
New Data Records from Third-Party Breaches:
515,974,251

New recaptured phished data this month

Third-Party Breaches Parsed and Ingested:
1,986,380

New infostealer malware data this month

Stealer Logs Parsed and Ingested:
2,554,217
New Data Records from Stealer Infections:
996,781,015
New Stolen Cookie Records:
360,451,528

Discover what cybercriminals know about your business and your customers – and how those insights help you protect digital identities and prevent targeted attacks.

Keep reading

Lunar New Year scams and fraud prevention tips from SpyCloud.
Year of the Trojan Horse: Digital Red Envelope Scams, Schemes, & Fraud
Chinese-speaking cybercriminals have developed scams, fraud, malware, and money laundering schemes tied to the Lunar New Year red envelope tradition.
Enhanced supply chain threat protection with SpyCloud cybersecurity solutions.
What Static “Vendor Risk Scores” Miss: Find the Hidden Threats in Your Supply Chain
SpyCloud now gives your teams continuous, evidence-based visibility into the identity exposures affecting third-party partners & vendors in your ecosystem.

Check Your Company's Exposure

See your real-time exposure details powered by SpyCloud.

Have you seen what's new with Supply Chain Threat Protection? Check it out

X