Recently, the Microsoft Security Research Team (DART) issued a warning that a new type of malware called "SesameOp" is using OpenAI's Assistants API for cyberattacks. The innovation of this malware lies in using this legitimate cloud service as a covert command and control (C2) channel, allowing attackers to gain persistent access to victims' systems silently.

According to Microsoft's investigation, SesameOp was first discovered in a cyberattack in July 2025. This malware uses OpenAI's Assistants API as a storage and relay platform to send compressed and encrypted malicious commands to infected systems. After receiving the commands, the malware decrypts and executes them, while also stealing information from the system, encrypting it, and returning it to the attacker through the same API channel, forming a complete covert communication chain.
From a technical perspective, SesameOp includes a loader (Netapi64.dll) and a backdoor program developed based on .NET. To avoid detection by security software, this malware uses dual encryption with AES and RSA, combined with GZIP compression technology, increasing its stealth. Attackers also used an advanced technique called .NET AppDomainManager injection, which hijacks the .NET application loading process to execute malicious code, achieving long-term dormancy.
Microsoft stated that this attack did not exploit security vulnerabilities in the OpenAI platform but rather abused the built-in features of the Assistants API. After discovering this threat, Microsoft quickly collaborated with OpenAI to block the accounts and API keys used by the attackers. In addition, Microsoft plans to deprecate the abused Assistants API in August 2026.
To address the risks posed by SesameOp, Microsoft advises enterprise security teams to take a series of measures, including strict audit of firewall logs, monitoring unauthorized external connections, and enabling tamper protection features on devices. At the same time, enterprises should configure endpoint detection and response (EDR) systems to interception mode to actively prevent the execution of malicious activities.
Key points:
💻 A new type of malware called "SesameOp" has been discovered, using OpenAI Assistants API for covert attacks.
🔒 Attackers use encrypted commands and information return to achieve persistent infiltration and remote control.
🚨 Microsoft advises enterprises to strengthen network security monitoring and take measures to prevent such attacks.
