308. Adversaries Abuse OpenAI Assistants API

Hello everyone!

Today we'll look at another curious example of how adversaries abuse AI to solve various problems, this time they leveraged OpenAI Assistants API.

Microsoft DART uncovered a new malware, SesameOp, which uses OpenAI Assistants API for its command-and-control communications. 

The infection chain consists of a loader (Netapi64.dll) and a NET-based backdoor (OpenAIAgent.Netapi64). Netapi64.dll is loaded at runtime into the host executable via .NET AppDomainManager injection, as instructed by a crafted .config file accompanying the host executable.

So, it's a good hunting idea to look for suspicious connections to api[.]openai[.]com:

event_type: "dnsreqwin"

AND

dns_rname: "api.openai.com"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge