OpenAI API Hijacked: The Comedic Misadventures of Cyber Espionage
A new backdoor named SesameOp uses the OpenAI Assistants API for covert command-and-control communications. This clever twist in cyber mischief shows how attackers can abuse generative AI services. Microsoft discovered this sneaky tactic, and with OpenAI, they’re working to understand and curb the misuse of emerging technologies.

Hot Take:
Who knew AI could be your best friend and your worst enemy at the same time? In an unexpected plot twist, threat actors have found a way to turn OpenAI’s friendly APIs into their own little command center. It’s like inviting a vampire over for dinner and wondering why all your garlic bread keeps disappearing! Buckle up, folks, because the cybersecurity world just got a whole lot more entertaining, with ‘SesameOp’ playing the villain in this episode of “When APIs Attack!”
Key Points:
- A new backdoor, dubbed “SesameOp,” was discovered using OpenAI’s API for covert command-and-control (C2) communications.
- Researchers from Microsoft’s Detection and Response Team (DART) found the backdoor during an investigation into a long-term espionage attack.
- The attackers used sophisticated techniques, including compression and encryption, to disguise their C2 communications.
- Microsoft and OpenAI collaborated to address the misuse of the API, which is not a vulnerability but rather an exploitation of existing capabilities.
- Organizations are advised to audit firewalls, web server logs, and configure security settings to mitigate similar threats.
