Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SesameOp Malware Abuses OpenAI API 

Posted on November 4, 2025November 4, 2025 By CWS

A risk actor has abused the OpenAI Assistants API as a communication mechanism between its command-and-control (C&C) server and a stealthy backdoor, Microsoft studies.

Dubbed SesameOp, the backdoor was deployed as a part of a complicated assault wherein the risk actor maintained entry to the compromised setting for months, counting on a posh community of net shells for command execution.

The instructions, Microsoft says, have been relayed by way of malicious processes that abused compromised Visible Studio utilities to load malicious libraries, a method known as .NET AppDomainManager injection.

Enabling the attackers to handle contaminated gadgets remotely, SesameOp was designed for long-term persistence, suggesting the assault was geared toward espionage.

The attackers, Microsoft explains, modified the configuration file of a number executable so it could load at runtime a DLL named Netapi64.dll, utilizing .NET AppDomainManager injection.

The DLL acts as a loader for the backdoor, which is saved within the Temp folder beneath the title OpenAIAgent.Netapi64.

The malware makes use of the OpenAI Assistants API to fetch instructions from its C&C server and, as soon as the duty has been accomplished, it sends the consequence to OpenAI, as a message.

The OpenAI Assistants characteristic allows the creation of customized AI brokers that customers can affiliate with duties, workflows, and domains.Commercial. Scroll to proceed studying.

When establishing communication, the backdoor first queries a vector retailer listing from OpenAI, and checks if it incorporates hostnames. No hostname ought to exist if the communication takes place for the primary time, and a vector retailer is created utilizing the contaminated system’s hostname.

Subsequent, the backdoor retrieves a listing of Assistants from the attacker’s OpenAI account. The listing contains ID, title, description, and directions variables.

The outline area might include the choices Sleep, Payload, or Consequence. The attackers use the primary two to ship messages and payloads to the backdoor, that are decoded and executed utilizing the instruction worth. The third is utilized by the malware to ship the consequence from the payload’s execution.

Microsoft says it recognized an API key used on this assault and notified OpenAI, which disabled each the important thing and the related account that was possible utilized by the risk actor as a part of the operation. The OpenAI Assistants API can be deprecated in August 2026.

Associated: Russian APT Switches to New Backdoor After Malware Uncovered by Researchers

Associated: China-Linked Hackers Hijack Net Site visitors to Ship Backdoor

Associated: Microsoft Dissects PipeMagic Modular Backdoor

Associated: MITRE Hackers’ Backdoor Has Focused Home windows for Years

Security Week News Tags:Abuses, API, Malware, OpenAI, SesameOp

Post navigation

Previous Post: Bugcrowd Acquires Application Security Firm Mayhem
Next Post: Hacker Conversations: Kunal Agarwal and the DNA of a Hacker

Related Posts

Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers Security Week News
Fighting the Cyber Forever War: Born Defense Blends Investment Strategy with Just War Principles Security Week News
Chinese Hackers Target Chinese Users With RAT, Rootkit Security Week News
Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching Security Week News
NASCAR Confirms Personal Information Stolen in Ransomware Attack Security Week News
Trump Cybersecurity Executive Order Targets Digital Identity, Sanctions Policies Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks
  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
  • Bob Flores, Former CTO of the CIA, Joins Brinker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
  • Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks
  • Critical Flaw in Popular React Native NPM Package Exposes Developers to Attacks
  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
  • Bob Flores, Former CTO of the CIA, Joins Brinker

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News