OpenAI API moonlights as malware HQ in Microsoft's latest discovery

Hackers have found a new use for OpenAI's Assistants API - not to write poems or code, but to secretly control malware.

Microsoft this week detailed a previously unseen backdoor dubbed "SesameOp," which abuses OpenAI's Assistants API as a command-and-control channel to relay instructions between infected systems and the attackers pulling the strings. First spotted in July during a months-long intrusion, the campaign hid in plain sight by blending its network chatter with legitimate AI traffic - an ingenious way to stay invisible to anyone assuming "api.openai.com" meant business as usual.

According to Microsoft's Incident Response team, the attack chain starts with a loader that uses a trick known as ".NET AppDomainManager injection" to plant the backdoor. The malware doesn't talk to ChatGPT or do anything remotely conversational; it simply hijacks OpenAI's infrastructure as a data courier. Commands come in, results go out, all via the same channels millions of users rely on every day.

By piggy-backing on a legitimate cloud service, SesameOp avoids the usual giveaways: no sketchy domains, no dodgy IPs, and no obvious C2 infrastructure to block.

"Instead of relying on more traditional methods, the threat actor behind this backdoor abuses OpenAI as a C2 channel as a way to stealthily communicate and orchestrate malicious activities within the compromised environment," Microsoft said. "This threat does not represent a vulnerability or misconfiguration, but rather a way to misuse built-in capabilities of the OpenAI Assistants API."

Microsoft's analysis shows the implant uses payload compression and layered encryption to hide commands and exfiltrated results; the DLL is heavily obfuscated with Eazfuscator.NET and is loaded at runtime via .NET AppDomainManager injection, after which the backdoor fetches encrypted commands from the Assistants API, decrypts and executes them locally, then posts the results back - techniques Microsoft describes as sophisticated and designed for stealth.

For defenders, this is where things get messy. Seeing a connection to OpenAI's API on your network doesn't exactly scream "compromise." Microsoft even published a hunting query to help analysts spot unusual connections to OpenAI endpoints by process name - an early step toward distinguishing genuine chatbot activity from malicious use.

The Assistants API itself is scheduled for deprecation in August 2026, which may close this particular loophole. But the pattern is here to stay: if it's cloud-hosted and trusted, it's fair game.

Microsoft hasn't said who's behind the campaign, but noted that it shared its findings with OpenAI, which identified and disabled an API key and account believed to have been used by the attackers.

OpenAI didn't respond to The Register's request for comment.

In an age where everything from HR chatbots to help-desk scripts talks to an API, this won't be the last time a threat actor turns your favorite cloud tool into their getaway car. ®

Search
About Us
Website HardCracked provides softwares, patches, cracks and keygens. If you have software or keygens to share, feel free to submit it to us here. Also you may contact us if you have software that needs to be removed from our website. Thanks for use our service!
IT News
Nov 12
Microsoft ships .NET 10 LTS and Visual Studio 2026, Copilot everywhere

Faster and easier to use but adopting the dev stack not without risks

Nov 12
MS Task Manager turns 30: Creator reveals how a 'very Unixy impulse' endured in Windows

Dave Plummer's 85 KB troubleshooting tool shipped with his home number on the code

Nov 12
Broadcom creates a new Seal Of Approval for servers that run AI under VMware

This apparently makes VCF more extensible and open to partners

Nov 12
Mozilla's Firefox 145 is heeeeeere: Buffs up privacy, bloats AI

Improves tracking prevention, profile management, PDF editing, and Perplexity creeps into your address bar

Nov 12
Retail giant Kingfisher rejects SAP ERP upgrade plan

'Don't just give me a price list or licensing module that spikes cost by 20x, show me the value,' says CTO

Nov 11
EU's reforms of GDPR, AI slated by privacy activists for 'playing into Big Tech's hands'

Lobbying efforts gain ground as proposals carve myriad holes into regulations