SMB Tech & Cybersecurity Leadership Newsletter

SMB Tech & Cybersecurity Leadership Newsletter

SesameOp: The New Backdoor Abusing OpenAI API for C2

Microsoft finds malware using the Assistants API for stealthy command and control. Learn how this espionage tactic works and how to mitigate it.

Christophe Foulon 📓's avatar
Christophe Foulon 📓
Nov 04, 2025
∙ Paid

Beyond the Hype: How the “SesameOp” Backdoor Turns OpenAI into a Stealthy C2 Channel (And How to Fight Back)

In the cybersecurity world, we often talk about attackers “living off the land”—using a victim’s own internal tools (like PowerShell or WMI) to avoid detection. But what happens when they start “living off the trusted service“?

We’re now seeing the answer. Security researchers at Microsoft have uncovered a novel backdoor, dubbed “SesameOp,” that cleverly abuses the OpenAI Assistants API, not for generating text, but as a stealthy, encrypted command-and-control (C2) channel.

This discovery, detailed by both The Hacker News and SecurityWeek, marks a significant evolution in attacker tactics. It turns a universally trusted, high-reputation service into a covert tool for espionage.

Here’s a breakdown of how it works and, more importantly, how you can defend against this new class of threat.

SMB Tech & Cybersecurity Leadership Newsletter is a reader-supported publication. To receive new …

User's avatar

Continue reading this post for free, courtesy of Christophe Foulon 📓.

Or purchase a paid subscription.
© 2026 Christophe Foulon · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture