More

    Microsoft warns a key OpenAI API is being exploited to launch cyberattacks



    • SesameOp malware uses OpenAI’s Assistants API as a covert command-and-control channel
    • It enables persistent access, runs commands, and exfiltrates data via encrypted API traffic
    • Microsoft urges firewall audits, tamper protection, and endpoint detection to mitigate threats

    To be able to operate properly, malware needs a way to communicate with its “headquarters” – the command & control (C2) server – which is one of the usual ways cybersecurity researchers identify malware – by looking at suspicious communications – which is why crooks go to lengths to try and hide these “conversations” in plain sight.

    Recently, security researchers from Microsoft discovered a new piece of malware that uses a creative way of hiding this dialogue, abusing OpenAI’s Assistants API, a programming interface that lets developers integrate OpenAI’s AI “assistant” capabilities into their own applications, products, or services.


    https://cdn.mos.cms.futurecdn.net/2KzVq8gkFv5n7v3rCCqCoe-1920-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img