OpenAI Responds to Axios npm Supply Chain Attack, Rotates macOS Certificates
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是Axios npm供应链攻击的影响扩大,OpenAI也受到了影响。攻击被归因于朝鲜的Lazarus集团,由Google Threat Intelligence Group确认。OpenAI在声明中说他们只有限制性地暴露了问题,没有用户数据或内部系统被破坏。 攻击发生在3月31日,GitHub Actions工作流执行了恶意Axios版本。OpenAI采取了措施,包括旋转证书、更新应用,并与苹果合作阻止旧证书的使用。他们还找第三方调查影响。 根本原因是GitHub工作流配置错误,依赖浮动标签而非固定提交哈希,并且没有设置依赖的最小发布时间。这说明整个行业在开发管道上的漏洞。 最后,文章提到这次攻击的影响范围仅限于macOS应用,其他平台不受影响,并强调了供应链攻击的风险和加强安全管理的重要性。 现在我要把这些信息浓缩到100字以内。需要包括:Axios npm攻击扩大影响,OpenAI暴露有限,证书被旋转,应用更新要求,根本原因配置错误,行业警示加强安全措施。 </think> Axios npm供应链攻击事件持续发酵,OpenAI确认有限暴露,未发现用户数据或系统受损。恶意版本Axios通过GitHub工作流进入macOS应用签名流程,引发证书旋转和应用更新要求。根本原因是工作流配置错误,凸显开发管道安全风险。事件未波及其它平台,强调加强供应链安全的重要性。 2026-4-13 05:57:58 Author: thecyberexpress.com(查看原文) 阅读量:20 收藏

The fallout from the Axios npm supply chain attack continues to widen, with OpenAI issuing a detailed response outlining its exposure and remediation steps.

The Axios npm supply chain attack, reported by The Cyber Express on April 1, has since been linked to North Korea’s Lazarus Group, significantly expanding the scope and impact of the incident. Attribution was confirmed by Google Threat Intelligence Group, which identified the activity under UNC1069, a financially motivated group active since at least 2018.

OpenAI Confirms Limited Exposure to Axios npm Supply Chain Attack

In its official statement, OpenAI said, “We recently identified a security issue involving a third-party developer tool, Axios, that was part of a widely reported, broader industry incident⁠.” The company clarified that while it was affected by the broader Axios npm supply chain attack, there is no evidence of compromise to user data or internal systems.

“We found no evidence that OpenAI user data was accessed, that our systems or intellectual property was compromised, or that our software was altered,” the statement added.

The exposure occurred on March 31, 2026, when a GitHub Actions workflow used in OpenAI’s macOS app-signing process executed a malicious version of Axios (v1.14.1). This workflow had access to sensitive code-signing certificates used for validating OpenAI applications like ChatGPT Desktop, Codex, Codex CLI, and Atlas.

Certificate Rotation and macOS App Updates

As a direct response to the Axios npm supply chain attack, OpenAI has initiated a full rotation of its macOS code-signing certificates. While internal analysis suggests the certificate was likely not exfiltrated, the company is treating it as potentially compromised.

report-ad-banner

To mitigate any residual risk, OpenAI is requiring users to update their macOS applications. Older versions of affected apps will lose support and functionality after May 8, 2026. Updated versions will carry new certificates to ensure authenticity.

This move is designed to prevent threat actors from distributing malicious software disguised as legitimate OpenAI applications, a known risk in supply chain attacks involving code-signing materials.

Investigation and Security Measures

OpenAI engaged a third-party digital forensics and incident response firm to investigate the impact of the Axios npm supply chain attack. The company also coordinated with Apple to block any new notarization attempts using the old certificate.

Additional steps taken include:

  • Publishing new builds of all affected macOS applications
  • Reviewing all past software notarizations for anomalies
  • Ensuring no unauthorized modifications were made to distributed software

The company confirmed that no malicious applications signed with its certificate have been identified so far.

Root Cause: GitHub Workflow Misconfiguration

The root cause of OpenAI’s exposure to the Axios npm supply chain attack was traced to a misconfiguration in its GitHub Actions workflow. Specifically, the workflow relied on a floating tag instead of a fixed commit hash and lacked a minimum release age for dependencies, both of which increased the risk of pulling compromised packages.

This highlights a broader industry issue where development pipelines remain vulnerable to upstream compromises, especially in open-source ecosystems.

No Impact on User Data or Other Platforms

OpenAI emphasized that the incident is limited strictly to macOS applications. There is no impact on iOS, Android, Windows, Linux, or web-based services.

The company also reassured users:

  • No user data or API keys were compromised
  • No passwords need to be changed
  • No malware signed as OpenAI has been detected

What Happens Next

OpenAI will fully revoke the old certificate on May 8, 2026, after a 30-day transition window. This approach is intended to minimize disruption while ensuring users have adequate time to update their applications.

The company noted that any software signed with the old certificate will be blocked by macOS security protections after revocation, further reducing the risk of misuse.

Growing Impact of Axios npm Supply Chain Attack

The Axios npm supply chain attack highlight the escalating risks tied to third-party software dependencies. With attribution pointing to a state-sponsored group, the incident reflects how supply chain attacks are increasingly being leveraged for financial and strategic objectives.

As organizations continue to rely heavily on open-source libraries, the incident serves as a reminder of the need for stricter dependency management, secure development practices, and continuous monitoring of software pipelines.


文章来源: https://thecyberexpress.com/axios-npm-supply-chain-attack-escalating/
如有侵权请联系:admin#unsafe.sh