Microsoft: SesameOp malware abuses OpenAI Assistants API in attacks
好的,我现在要帮用户总结这篇文章的内容。用户的要求是用中文,控制在100字以内,不需要特定的开头,直接写描述即可。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是微软安全研究人员发现了一种新的恶意软件SesameOp,它利用OpenAI的API作为命令控制通道。这种恶意软件通过合法云服务远程管理被入侵设备,持续几个月。攻击者滥用API进行隐蔽通信和恶意活动,窃取信息并通过API传输。微软与OpenAI合作调查,并禁用了相关账户和API密钥。 接下来,我需要将这些信息浓缩到100字以内。重点包括:发现SesameOp、利用OpenAI API、隐蔽通信、窃取信息、微软合作应对。 然后,组织语言,确保简洁明了。例如:“微软发现新型恶意软件 SesameOp 利用 OpenAI API 作为隐蔽命令控制通道,窃取信息并远程管理设备数月。攻击者滥用 API 进行恶意活动,微软与 OpenAI 合作禁用相关账户。” 最后检查字数是否符合要求,并确保内容准确无误。 </think> 微软发现新型恶意软件 SesameOp 利用 OpenAI API 作为隐蔽命令控制通道,窃取信息并远程管理设备数月。攻击者滥用 API 进行恶意活动,微软与 OpenAI 合作禁用相关账户。 2025-11-3 18:45:20 Author: www.bleepingcomputer.com(查看原文) 阅读量:9 收藏

Malware

Microsoft security researchers have discovered a new backdoor malware that uses the OpenAI Assistants API as a covert command-and-control channel.

The company's Detection and Response Team (DART) discovered the new malware, named SesameOp, during an investigation into a July 2025 cyberattack, which revealed that the malware allowed attackers to gain persistent access to the compromised environment.

Deploying this malware also enabled the threat actors to remotely manage backdoored devices for several months by leveraging legitimate cloud services, rather than relying on dedicated malicious infrastructure that could alert victims to an attack and be taken down during subsequent incident response.

Wiz

"Instead of relying on more traditional methods, the threat actor behind this backdoor abuses OpenAI as a C2 channel as a way to stealthily communicate and orchestrate malicious activities within the compromised environment," the Microsoft Incident Response team said in a Monday report.

"To do this, a component of the backdoor uses the OpenAI Assistants API as a storage or relay mechanism to fetch commands, which the malware then runs."

The SesameOp backdoor uses the OpenAI Assistants API as a storage and relay mechanism to fetch compressed and encrypted commands, which the malware decrypts and executes on infected systems. The information harvested in the attacks is encrypted using a combination of symmetric and asymmetric encryption and transmitted back through the same API channel.

The attack chain observed by DART researchers involved a heavily obfuscated loader and a .NET-based backdoor deployed through .NET AppDomainManager injection into multiple Microsoft Visual Studio utilities. The malware establishes persistence through internal web shells and "strategically placed" malicious processes designed for long-term espionage operations.

Microsoft states that the malware doesn't exploit a vulnerability or misconfiguration in OpenAI's platform, but rather misuses built-in capabilities of the Assistants API (scheduled for deprecation in August 2026). Microsoft and OpenAI collaborated to investigate the threat actors' abuse of the API, which led to the identification and disabling of the account and API key used in the attacks.

"The stealthy nature of SesameOp is consistent with the objective of the attack, which was determined to be long term-persistence for espionage-type purposes," Microsoft added.

To mitigate the impact of SesameOp malware attacks, Microsoft advises security teams to audit firewall logs, enable tamper protection, configure endpoint detection in block mode, and monitor unauthorized connections to external services.

Wiz

The 2026 CISO Budget Benchmark

It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026.

Learn how top leaders are turning investment into measurable impact.


文章来源: https://www.bleepingcomputer.com/news/security/microsoft-sesameop-malware-abuses-openai-assistants-api-in-attacks/
如有侵权请联系:admin#unsafe.sh