Skip to main content
See every side of every news story
Published loading...Updated

Microsoft: OpenAI API Moonlights as Malware HQ

SesameOp malware covertly manages infected devices using OpenAI Assistants API, enabling months-long espionage by blending commands with legitimate AI traffic, Microsoft researchers said.

  • On Monday, Microsoft's Detection and Response Team revealed that SesameOp backdoor exploits the OpenAI Assistants API, and Microsoft and OpenAI disabled the associated account and API key.
  • Threat actors abused the OpenAI Assistants API by blending network chatter with legitimate AI traffic to api.openai.com, hiding commands and results within normal calls.
  • Using a heavily obfuscated loader, researchers found the attack chain deployed a.NET backdoor via.NET AppDomainManager injection into Microsoft Visual Studio utilities, using payload compression and Eazfuscator.NET-obfuscated DLL payloads.
  • To limit impact, defenders should audit firewall logs and monitor external connections, as Microsoft said `The stealthy nature of SesameOp is consistent with the objective of the attack, which was determined to be long term-persistence for espionage-type purposes`.
  • With cloud-hosted tools in wide use, Microsoft notes the Assistants API is scheduled for deprecation, which may close this loophole while security teams secure cloud-hosted trusted services as MCP becomes standard.
Insights by Ground AI

11 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center

Factuality 

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

BleepingComputer broke the news in on Monday, November 3, 2025.
Sources are mostly out of (0)
News
For You
Search
BlindspotLocal