TRENDING TOPICS NOV 04, 2025

SesameOp: Backdoor Leveraging OpenAI API for Covert Command-and-Control

Microsoft’s Incident Response team identified a stealthy backdoor, labeled SesameOp, that repurposes the OpenAI Assistants API as an off-the-shelf command-and-control channel. The implant comprises an obfuscated[.]NET loader injected into developer tooling via AppDomainManager manipulation, and a secondary[.]NET component that polls the Assistants API for encrypted commands. Operators hide instructions inside Assistants metadata and vector stores, then deliver payloads that are compressed, symmetrically encrypted, and wrapped with an RSA key before being sent to victims; results are compressed, encrypted, and posted back through the same API thread, creating a resilient two-way control channel that blends with legitimate cloud traffic. The victim-side component performs hostname registration, optional proxy use, and dynamic loading of embedded modules that execute commands using a JScript engine, enabling complex tasking while minimizing on-network signature artifacts. Microsoft and OpenAI coordinated to disable the abused account and API key associated with the incident, and OpenAI’s Assistants API is scheduled for deprecation in August 2026. From a risk perspective, SesameOp demonstrates two worrying trends: adversaries are weaponizing mainstream cloud services to hide malicious control flows, and they are leveraging trusted platform behaviors to resist traditional network blocking and takedown efforts. The attack chain demonstrates careful operational tradecraft: heavy binary obfuscation, persistence via internal web shells and developer utilities, and layered encryption to frustrate inspection. Detection requires telemetry beyond classic firewall logs; defenders should look for unusual outbound connections to api[.]openai[.]com from developer and build hosts, unexpected AppDomainManager activity, and temporary files or mutexes created by unknown DLLs in system temp directories. Immediate controls include enforcing strict egress policies that limit access to cloud APIs to vetted services, enabling endpoint tamper protection and EDR in block mode, applying application allowlisting for developer tools, and instituting rapid threat hunting queries that flag devices making repeated connections to OpenAI endpoints or loading external assemblies at runtime. These measures will reduce exposure, while broader collaboration with cloud providers and intelligence partners can disrupt misuse of legitimate platforms for covert C2.

Cargo Heists Enabled by RMM: Targeting Trucking and Logistics

Criminal-aligned threat actors have shifted their focus to trucking and logistics firms, using compromised email accounts and hijacked load-board accounts to distribute booby-trapped installers that deploy legitimate remote monitoring and management tools. Proofpoint traces activity back to at least June 2025 and reports collaboration with organized crime to convert cyber access into physical theft, with food and beverage shipments frequently targeted. Attackers post fraudulent freight listings, lure carriers into email threads, and send malicious links that install ScreenConnect, SimpleHelp, PDQ Connect, Fleetdeck, N-able, or LogMeIn Resolve; in several incidents, multiple RMM products are chained to cement access. Once RMM control is established, adversaries conduct system and network reconnaissance, harvest credentials, and escalate privileges to manipulate dispatch systems and bid on lucrative loads. The endgame is theft of cargo that is resold online or shipped abroad, turning compromised IT infrastructure into a direct enabler for physical crime. This wave of intrusions is opportunistic and broad, hitting small family-run carriers and major transport providers, with at least two dozen campaigns observed since August 2025. The choice to use legitimate remote management tooling removes the need for custom malware and reduces detection risk because installers are often signed and common in enterprise environments. Operators have demonstrated operational expertise by deleting legitimate bookings, silencing dispatcher alerts, adding rogue devices to dispatcher extensions, and coordinating pickups under compromised credentials. That fusion of cyber access and logistics fraud escalates both financial losses and supply-chain risk, making traditional IT-focused defenses insufficient on their own. To reduce exposure: tighten email hygiene and account takeover defenses for load-board and dispatcher accounts; enforce multi-factor authentication and strict change-control for RMM installations; restrict local administrative rights and require documented justification and verification for any remote management deployment; and instrument dispatch and booking systems with alerts for unusual cancellations, device enrollments, or itinerary changes.

Apple’s November 2025 Security Updates Strengthen iOS, iPadOS, and macOS Defense Layers

Apple rolled out iOS 26.1, iPadOS 26.1, and macOS 26.1 (Tahoe) on November 3, 2025, delivering a broad set of patches targeting performance, privacy, and system integrity vulnerabilities. The updates improve memory handling in the Apple Neural Engine to prevent system crashes and kernel corruption, while enhancements to the Apple Account framework close privacy gaps that previously allowed malicious apps to capture sensitive screen content. Core system components such as AppleMobileFileIntegrity and Assets were hardened to prevent sandbox escapes and unauthorized access to protected data. WebKit, the browser engine behind Safari, received extensive stability and security enhancements to prevent memory corruption, cross-origin data leaks, and arbitrary code execution through untrusted web content. These cumulative improvements demonstrate Apple’s focus on reinforcing user data protection and preventing exploit chains that abuse browser or app-level vulnerabilities. On the desktop side, macOS Tahoe 26.1, along with Sequoia 15.7.2 and Sonoma 14.8.2, implements parallel fixes for kernel-level vulnerabilities, privacy issues, and WebKit-related flaws. While Apple’s advisory for macOS 26.1 does not yet provide a full CVE breakdown, early industry analysis suggests over 38 distinct vulnerabilities were resolved, encompassing memory safety, sandbox enforcement, and information disclosure weaknesses. A previously addressed issue in macOS 26.0.1 (a font parser out-of-bounds write) indicates Apple’s ongoing effort to harden critical frameworks across its ecosystem. The company has credited multiple independent researchers for their findings and continues to withhold exploit-specific details until patch adoption reaches safe levels. Users are urged to install the updates promptly to reduce exposure to potential attacks leveraging unpatched flaws. 

💡
Hunter Strategy encourages our readers to look for updates in our daily Trending Topics and on Twitter.