Microsoft warns that a key OpenAI API is being exploited to launch cyberattacks


  • SesameOp malware uses OpenAI Assistants API as covert command and control channel
  • It allows persistent access, executes commands and exfiltrates data via encrypted API traffic
  • Microsoft recommends firewall audits, tamper protection, and endpoint detection to mitigate threats

To be able to function properly, malware needs a way to communicate with its “headquarters” – the command and control (C2) server – which is one of the usual ways cybersecurity researchers identify malware – by examining suspicious communications – which is why scammers work to hide these “conversations” in plain sight.

Recently, Microsoft security researchers discovered new malware that uses a creative way to hide this dialogue, by abusing OpenAI’s Assistants API, a programming interface that allows developers to integrate OpenAI’s AI “assistant” capabilities into their own applications, products or services.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top