Article Details

Scrape Timestamp (UTC): 2025-11-04 06:04:18.373

Source: https://thehackernews.com/2025/11/microsoft-detects-sesameop-backdoor.html

Original Article Text

Click to Toggle View

Microsoft Detects "SesameOp" Backdoor Using OpenAI's API as a Stealth Command Channel. Microsoft has disclosed details of a novel backdoor dubbed SesameOp that uses OpenAI Assistants Application Programming Interface (API) for command-and-control (C2) communications. "Instead of relying on more traditional methods, the threat actor behind this backdoor abuses OpenAI as a C2 channel as a way to stealthily communicate and orchestrate malicious activities within the compromised environment," the Detection and Response Team (DART) at Microsoft Incident Response said in a technical report published Monday. "To do this, a component of the backdoor uses the OpenAI Assistants API as a storage or relay mechanism to fetch commands, which the malware then runs." The tech giant said it discovered the implant in July 2025 as part of a sophisticated security incident in which unknown threat actors had managed to maintain persistence within the target environment for several months. It did not name the impacted victim. Further investigation into the intrusion activity has led to the discovery of what it described as a "complex arrangement" of internal web shells, which are designed to execute commands relayed from "persistent, strategically placed" malicious processes. These processes, in turn, leverage Microsoft Visual Studio utilities that were compromised with malicious libraries, an approach referred to as AppDomainManager injection. SesameOp is a custom backdoor engineered to maintain persistence and allow a threat actor to covertly manage compromised devices, indicating that the attack's overarching goal was to ensure long-term access for espionage efforts. OpenAI Assistants API enables developers to integrate artificial intelligence (AI)-powered agents directly into their applications and workflows. The API is scheduled for deprecation by OpenAI in August 2026, with the company replacing it with a new Responses API. The infection chain, per Microsoft, includes a loader component ("Netapi64.dll") and a .NET-based backdoor ("OpenAIAgent.Netapi64") that leverages the OpenAI API as a C2 channel to fetch encrypted commands, which are subsequently decoded and executed locally. The results of the execution are sent back to OpenAI as a message. "The dynamic link library (DLL) is heavily obfuscated using Eazfuscator.NET and is designed for stealth, persistence, and secure communication using the OpenAI Assistants API," the company said. "Netapi64.dll is loaded at runtime into the host executable via .NET AppDomainManager injection, as instructed by a crafted .config file accompanying the host executable." The message supports three types of values in the description field of the Assistants list retrieved from OpenAI - It's currently not clear who is behind the malware, but the development signals continued abuse of legitimate tools for malicious purposes to blend in with normal network activity and sidestep detection. Microsoft said it shared its findings with OpenAI, which identified and disabled an API key and associated account believed to have been used by the adversary.

Daily Brief Summary

MALWARE // Microsoft Uncovers SesameOp Backdoor Exploiting OpenAI API for Stealth C2

Microsoft has identified a new backdoor, SesameOp, utilizing OpenAI's API for covert command-and-control communications, bypassing traditional detection methods.

The backdoor was discovered in July 2025, linked to a prolonged security breach, though the specific victim remains unnamed.

SesameOp employs a complex setup of internal web shells and malicious processes, leveraging compromised Microsoft Visual Studio utilities for persistence.

The malware uses AppDomainManager injection to maintain long-term access, suggesting espionage as a primary objective.

OpenAI's Assistants API, used for the C2 channel, is set for deprecation in August 2026, to be replaced by a new API.

The infection chain includes a .NET-based backdoor and a loader component, both heavily obfuscated for stealth and persistence.

Microsoft has collaborated with OpenAI to disable an API key and account linked to the threat actor, mitigating further misuse.

This incident reflects ongoing abuse of legitimate platforms to conduct malicious activities while evading conventional security measures.