| ChatGBT |
Urgent security warning from OpenAI for Mac users
OpenAI has urged users of its macOS applications, including ChatGBT and Codex, to install new versions after several employee devices were hacked.
The attack targeted an open-source software library called Tanstack, a widely used web development library. On Monday, an attacker distributed 84 malicious code instances across 42 Tanstack npm packages, which function as pre-built software.
Some of the affected Tanstack software receives millions of downloads per week, meaning this breach could have affected a large number of projects and users, according to a report by PCMag, a technology news website, which was reviewed by Al Arabiya Business.
Security researchers were able to detect the malicious versions within the first 20 minutes and remove them. However, had this malware been installed, it would have downloaded malicious software capable of stealing developers' credentials for cloud computing accounts.
What is the connection to "OpenAI" applications?
OpenAI said that two computers belonging to employees with access to the "company environment" had installed malicious versions of the "Tanstack" software, prompting the company to launch an investigation.The company said in a blog post: "We found no evidence of access to OpenAI user data, breaches of our production or intellectual property systems, or modification of our software."
However, OpenAI detected activity consistent with the described behavior of malware, including unauthorized access and credential-focused data mining activity, in a limited subset of internal source code repositories that affected employees could access.
Source code repositories contain special signing certificates, which OpenAI uses to indicate that its applications are genuine and trustworthy. If these certificates are stolen, hackers can present malware as a trusted OpenAI product, bypassing the security mechanisms in operating systems.
The company said: "The affected source code repositories included signing certificates for our products, including iOS, macOS, and Windows systems. As a result, we are currently rotating code signing certificates as a precautionary measure, which will require macOS users to update their applications."
0 Comments