Microsoft warns that key OpenAI API is being exploited to launch cyberattacks



  • SesameOp malware uses OpenAI’s Assistants API as a covert command and control channel
  • It allows persistent access, executes commands and extracts data through encrypted API traffic.
  • Microsoft urges firewall audits, tamper protection and endpoint detection to mitigate threats

In order to function properly, malware needs a way to communicate with its “headquarters,” the command and control (C2) server, which is one of the common ways cybersecurity researchers identify malware by looking at suspicious communications, which is why criminals go to great lengths to try to hide these “conversations” in plain sight.

Recently, security researchers at Microsoft discovered a new piece of malware that uses a creative way to hide this dialog, abusing the OpenAI Assistants API, a programming interface that allows developers to integrate the capabilities of OpenAI’s AI “assistant” into their own applications, products or services.



Leave a Comment

Your email address will not be published. Required fields are marked *