OpenAI Strengthens Security Measures, Urges macOS Users to Update Following TanStack Supply Chain Attack
In a significant response to a recent supply chain attack, OpenAI has initiated a series of protective measures aimed at safeguarding its users. The attack compromised the signing keys essential for verifying the legitimacy of the company’s applications, prompting urgent updates for macOS users. Failure to comply with these updates by June 12 will result in the cessation of support and updates, potentially impairing application functionality.
The urgency of these measures is underscored by a broader supply chain campaign that has affected the popular open-source library TanStack, along with various npm and PyPI packages associated with multiple AI companies. OpenAI confirmed that two employee devices within its corporate environment were compromised during the attack, leading the company to engage an incident response firm to investigate and mitigate the situation.
OpenAI reported observing activity consistent with the malware’s known behavior, including unauthorized access and credential-focused exfiltration within a limited subset of internal source code repositories accessible to the affected employees. The company clarified that only a small amount of credential material was successfully exfiltrated, and no other information or code was compromised.
Immediate Actions Taken by OpenAI
In response to the breach, OpenAI has taken several immediate actions. The company isolated the affected systems, revoked user sessions, and rotated credentials. A thorough review of user and credential behavior was conducted, revealing no evidence of customer data theft. The compromised source code repositories included those for the company’s iOS, macOS, and Windows products. While users of Windows and iOS applications are not required to take any action, macOS users must install the updates to ensure continued functionality.
OpenAI is also collaborating with other platforms to prevent unauthorized use of the compromised certificates by halting new notarizations. The company has reviewed all software notarizations conducted with the previous certificates to confirm that no unauthorized software signing occurred and validated that published software remained unaltered. This proactive approach ensures that any fraudulent applications masquerading as OpenAI products will be blocked by macOS unless users explicitly override these protections.
The TanStack Attack: A Broader Context
The attack on TanStack has raised alarms within the cybersecurity and developer communities, particularly after 84 npm package artifacts were compromised. These packages were modified to include credential-stealing malware targeting developers. Many of the affected packages boast over 12 million weekly downloads, making them widely utilized within the developer ecosystem. TanStack’s post-mortem analysis highlighted that the malware not only steals credentials but also self-propagates, targeting other maintained packages and republishing them with the same malicious code.
UK government officials confirmed that the malicious packages were uploaded in two phases on April 29 and May 11. Avital Harel, security research lead at Upwind, noted that the attack resembles the act of downloading seemingly legitimate software updates, only to find hidden code designed to extract sensitive information such as passwords and access tokens. The potential downstream impact is considerable, as attackers gaining access to company systems or software publishing accounts could disrupt applications and services relied upon by millions.
Harel pointed out an unusual aspect of this campaign: its destructive behavior. The malware exhibited targeted actions against specific geographic regions, indicating a more sophisticated and intentional operation rather than opportunistic malware.
TeamPCP and the Sale of Stolen Data
On the same day, the group allegedly responsible for the attack, known as TeamPCP, offered for sale stolen internal repositories and source code from Mistral AI, another AI firm affected by the TanStack incident. A spokesperson for Mistral AI confirmed that a group of hackers temporarily compromised one of its codebase management systems on May 12 through a third-party software supply chain attack, contaminating some of the company’s packages.
Mistral AI acted swiftly to neutralize the attack, implementing necessary measures to secure its infrastructure and provide guidelines for its customers. An extensive forensic investigation was initiated in collaboration with relevant authorities, concluding that the attackers did not access any data beyond certain non-core code repositories. The company assured that its hosted services, managed user data, and research environments remained uncompromised.
TeamPCP has a history of similar attacks, including a notable incident in April involving the widely used open-source Python package LiteLLM, which allowed the hackers to breach several organizations, including the AI recruiting firm Mercor. The group also utilized a stolen Amazon API key to compromise the European Commission last month.
The Growing Threat of Supply Chain Attacks
Supply chain attacks have emerged as a prevalent method for hacking groups to compromise vast numbers of users and systems. The interconnected nature of open-source libraries, package managers, and continuous integration and deployment infrastructure makes modern software particularly vulnerable. OpenAI, in light of a previous supply chain hack attributed to alleged North Korean hackers in March, has accelerated the deployment of specific security controls and technologies to mitigate the risks associated with such attacks.
As the cybersecurity landscape evolves, the implications of these incidents extend beyond individual organizations, affecting the broader ecosystem of software development and deployment. The need for robust security measures and user awareness has never been more critical in safeguarding sensitive information and maintaining the integrity of software applications.
Source: therecord.media
Keep reading for the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.


