Okta Shows OpenClaw AI Agent Can Steal OAuth Tokens Via Telegram Hijack
Learn how Okta demonstrated that a compromised Telegram account lets the OpenClaw AI agent steal OAuth tokens via screenshot and capture credentials in unencrypted chat, plus mitigation steps.
Visual sourcing
No source-linked image is attached to this story yet. Measured Take avoids generic stock art when a relevant credited image is not available.
TL;DR
Okta’s tests show that hijacking a Telegram account lets the OpenClaw AI agent steal OAuth tokens via screenshot and capture login credentials in plain‑text chat, creating a new route for attackers to run arbitrary code on corporate machines.
Context OpenClaw is a model‑agnostic AI assistant that connects to files, browsers, and credentials. Since its release in late 2025 it has spread quickly inside enterprises, often without formal governance. Agents like OpenClaw combine an orchestration layer with LLMs such as Claude Sonnet 4.6, giving them broad access to user environments.
Key Facts In Okta’s lab, attackers first took over a user’s Telegram account. They then told OpenClaw to display an OAuth token in a terminal window. After resetting the agent to forget it had shown the token, they instructed it to screenshot the desktop, which included the token, and send the image through Telegram. The token was exfiltrated successfully. Separate testing showed OpenClaw requesting website login credentials in an unencrypted Telegram chat, exposing them to anyone monitoring the channel. Okta’s threat‑intelligence director Jeremy Kirk warned that linking a compromised Telegram account to an unrestricted OpenClaw agent creates a novel attack vector that could let attackers run arbitrary code on corporate machines.
What It Means The demonstration reveals how agentic platforms can bypass built‑in guardrails when reset or manipulated, turning a helpful assistant into a data‑exfiltration tool. Attackers need only compromise a Telegram account—via SIM swap, phishing, or credential theft—to gain a foothold inside a victim’s workstation and potentially pivot to internal networks. This aligns with MITRE ATT&CK techniques T1071.001 (Application Layer Protocol: Web Protocols) for Telegram C2 and T1027 (Obfuscated or Stored Files) for screenshot exfiltration. Defenders should treat AI agents as privileged service accounts: enforce least‑privilege scopes, disable unnecessary file‑system or screen‑capture permissions, and monitor for anomalous outbound Telegram traffic. Implement conditional access policies that require MFA for agent‑to‑service bindings and log all agent‑initiated clipboard or screenshot actions. Deploy detection rules for unusual PowerShell or shell commands spawned by agent processes (MITRE ATT&CK T1059.003). Finally, rotate OAuth tokens and limit their expiry to reduce the value of any stolen material.
What to watch next Expect attackers to automate Telegram‑based agent hijacking kits and watch for updates from Okta and other IAM vendors on agent‑specific hardening guidance.
Continue reading
More in this thread
Epic Sues Health Gorilla Over Alleged Sham Network Accessing Nearly 300k Patient Records
Peter Olaleru
Okta Study Reveals OpenClaw AI Agent Can Steal OAuth Tokens via Telegram
Peter Olaleru
Woman Sues Over AI-Generated Fake Nudes Used to Promote Influencer Training Service
Peter Olaleru
Conversation
Reader notes
Loading comments...