Home > Blog > Qihoo 360's AI Security Tool Exposes SSL Private Key
Industry Insights

Qihoo 360's AI Security Tool Exposes SSL Private Key

By whois-secure March 29, 2026 2 views

Qihoo 360's AI Security Tool Exposes SSL Private Key

In a significant security lapse, Chinese cybersecurity firm Qihoo 360 inadvertently exposed a production SSL private key within the installer of its newly launched AI-powered security tool, '360 Security Claw.' This exposure could potentially allow attackers to impersonate official services and intercept encrypted communications.

Discovery of the Exposure

The issue was discovered by security researcher Lukasz Olejnik, who found the private key embedded within the installer package for '360 Security Claw.' According to Olejnik, the key was located in the credentials directory of the installer executable (namiclaw.exe), making it accessible to anyone who downloaded the package. This discovery raises serious concerns about the security practices employed during the development and distribution of the software.

Implications of the Exposure

An SSL private key is a critical component of HTTPS encryption, used to authenticate servers and secure communications between users and online services. The exposure of such a key can have severe consequences, including:

  • Man-in-the-Middle Attacks: Attackers could use the exposed key to decrypt sensitive information, such as login credentials and personal data, by intercepting communications between users and the affected domain.
  • Service Impersonation: Malicious actors could impersonate the official services of Qihoo 360, leading users to believe they are interacting with legitimate platforms while their data is being compromised.
  • Trust Erosion: The exposure undermines user trust in Qihoo 360's security products, potentially affecting the company's reputation and customer base.

Response and Mitigation

Upon being informed of the exposure, Qihoo 360 took immediate steps to address the issue. The company released an updated version of the '360 Security Claw' installer, ensuring that the SSL private key was no longer included in the package. Additionally, Qihoo 360 revoked the compromised certificate and issued a new one to secure their services.

Users who downloaded the affected version of the installer are advised to uninstall it and download the updated version from Qihoo 360's official website. It is also recommended that users change any passwords or credentials that may have been compromised during the period of exposure.

Lessons Learned

This incident highlights the importance of rigorous security practices during the development and distribution of software, especially those designed to enhance cybersecurity. Key takeaways include:

  • Secure Development Practices: Implementing secure coding practices and conducting thorough code reviews can help prevent the inclusion of sensitive information in software releases.
  • Comprehensive Testing: Regular security testing, including static and dynamic analysis, can identify vulnerabilities before software reaches end-users.
  • Incident Response Planning: Having a robust incident response plan enables organizations to quickly address security breaches, minimizing potential damage.

As AI continues to play a pivotal role in cybersecurity, ensuring the security of AI-powered tools is paramount. Organizations must prioritize security at every stage of the software development lifecycle to protect users and maintain trust in their products.

For more information on this incident, refer to the original report by CyberInsider: Qihoo 360's new AI-powered security tool exposed SSL private key.

Tags: Qihoo 360 AI security SSL private key exposure cybersecurity incident
CyberEdge Learning
Level Up Your Cybersecurity Skills
Liked this article? Go deeper with hands-on training, certification prep, and real-world labs at CyberEdge Learning.
Start Free →