Microsoft warns that a key OpenAI API is being exploited to launch cyber attacks


  • The SesameOp malware uses OpenAI’s Assistants API as a covert command-and-control channel
  • It enables persistent access, runs commands and exfiltrates data via encrypted API traffic
  • Microsoft encourages firewall audits, tamper protection, and endpoint detection to mitigate threats

In order to function properly, malware needs a way to communicate with its “headquarters” – the command and control (C2) server – which is one of the usual ways cybersecurity researchers identify malware – by looking at suspicious communications – which is why bad guys go to great lengths to try to hide these “conversations” in plain sight.

Recently, security researchers from Microsoft discovered a new piece of malware that uses a creative way to hide this dialog, abusing OpenAI’s Assistants API, a programming interface that lets developers integrate OpenAI’s AI “assistant” features into their own applications, products or services.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top