Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»OpenAI Assistants API Exploited in ‘SesameOp’ Backdoor
News

OpenAI Assistants API Exploited in ‘SesameOp’ Backdoor

Team-CWDBy Team-CWDNovember 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Threat actors are weaponizing the OpenAI Assistants Application Programming Interface (API) to deploy a backdoor and manage compromised devices remotely.

The backdoor was discovered by Microsoft Incident Response’s Detection and Response Team (DART) researchers in July 2025 while responding to a sophisticated security incident, where the threat actors had maintained a presence within the environment for several months.

The investigation uncovered a complex arrangement of internal web shells leveraging multiple Microsoft Visual Studio utilities that had been compromised with malicious libraries.

These sophisticated mechanisms were responsible for running commands relayed from persistent, strategically placed malicious processes, as well as a backdoor that DART researchers named ‘SesameOp.’

Instead of relying on more traditional methods, the backdoor exploits legitimate OpenAI’s Assistants API for command-and-control (C2) communications between the threat actors and the compromised devices.

The Assistants API is expected to be deprecated by OpenAI in August 2026 and replaced by the Responses API.

Microsoft DART researchers shared their findings about SesameOp in a report published on November 3.

SesameOp Uses OpenAI Assistants API to Fetch Commands

SesameOp is a covert backdoor purpose-built to maintain persistence and allow a threat actor to stealthily manage compromised devices.

The backdoor mechanism is made of a loader in the form of the dynamic link library (DLL), Netapi64.dll, and a NET-based backdoor, OpenAIAgent.Netapi64, that leverages OpenAI as a C2 channel.

The DLL file is heavily obfuscated using Eazfuscator.NET and is designed for stealth, persistence and secure communication using the OpenAI Assistants API.

Netapi64.dll is loaded at runtime into the host executable via a defense evasion method called .NET AppDomainManager injection, as instructed by a crafted .config file accompanying the host executable.

Meanwhile, OpenAIAgent.Netapi64, the main functionality that enables the backdoor to operate, does not utilize OpenAI agent software development kits (SDKs) or model execution features, despite what its filename could suggest.

“Instead, it uses OpenAI Assistants API to fetch commands, which the malware then decrypts and executes locally. Once the tasks are completed, it sends the results back to OpenAI as a message. To stay under the radar, it uses compression and encryption, ensuring both the incoming payload and the outgoing results remain hidden,” the DART researchers wrote in the report.

The July investigation also revealed sophisticated techniques employed to secure and obfuscate communications, including payload compression to minimize size and layered encryption mechanisms both symmetric and asymmetric to protect command data and exfiltrated results.

Microsoft’s Mitigation Recommendations Against SesameOp

In its report, Microsoft recommended the following mitigations to reduce the impact of the SesameOp threat:

  • Audit and review firewalls and web server logs frequently
  • Use Windows Defender Firewall, intrusion prevention systems, and network firewall to block C2 server communications across endpoints whenever feasible
  • Review and configure your perimeter firewall and proxy settings to limit unauthorized access to services, including connections through non-standard ports
  • Ensure that tamper protection is enabled in Microsoft Dender for Endpoint
  • Run endpoint detection and response in block mode so that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus does not detect the threat or when Microsoft Defender Antivirus is running in passive mode
  • Configure investigation and remediation in full automated mode to let Microsoft Defender for Endpoint take immediate action on alerts to resolve breaches, significantly reducing alert volume
  • Turn on potentially unwanted applications (PUA) protection in block mode in Microsoft Defender Antivirus
  • Turn on cloud-delivered protection in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques
  • Turn on Microsoft Defender Antivirus real-time protection



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSmishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
Next Article ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands
Team-CWD
  • Website

Related Posts

News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

2025’s most common passwords were as predictable as ever

January 21, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.