Microsoft warns that key OpenAI API is being exploited to launch cyberattacks

OpenAI logo on a smartphone screen
2 minutes
  • SesameOp malware makes use of OpenAI’s Assistants API as a covert command and management channel
  • It permits persistent entry, executes instructions and extracts information via encrypted API site visitors.
  • Microsoft urges firewall audits, tamper safety and endpoint detection to mitigate threats

In order to perform correctly, malware wants a solution to talk with its “headquarters,” the command and management (C2) server, which is among the frequent methods cybersecurity researchers determine malware by suspicious communications, which is why criminals go to nice lengths to attempt to disguise these “conversations” in plain sight.

Recently, safety researchers at Microsoft found a brand new piece of malware that makes use of a inventive solution to disguise this dialog, abusing the OpenAI Assistants API, a programming interface that enables builders to combine the capabilities of OpenAI’s AI “assistant” into their very own functions, services or products.

“Rather than counting on extra conventional strategies, the risk actor behind this backdoor abuses OpenAI as a C2 channel as a solution to stealthily talk and orchestrate malicious actions inside the compromised setting,” Microsoft’s incident response group mentioned within the report. “To do that, a backdoor part makes use of the OpenAI Assistants API as a store-or-forward mechanism to retrieve instructions, which the malware then executes.”

Used for espionage

The malware known as SesameOp and was found in July 2025. It grants its attackers persistent entry to the compromised setting, in addition to the same old backdoor capabilities. All data obtained within the assaults is then encrypted and despatched again via the identical API channel.

It’s additionally price emphasizing that this isn’t a vulnerability within the OpenAI platform, however slightly a built-in functionality of the Assistants API that’s being abused. According beepcomputerThe API itself is scheduled to be deprecated in August 2026 anyway.

“The stealthy nature of SesameOp is in line with the aim of the assault, which was decided to be long-term persistence for espionage-type functions,” Microsoft added.

Those involved about potential SesameOp malware assaults ought to audit their firewall logs, allow tamper safety, and set endpoint detection to blocking mode. Additionally, they need to additionally management unauthorized connections to exterior providers.

Through beepcomputer