Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Command and Control appears in 1 case steps.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Command and Control
Step 1
AI Service API
The threat actor abused the OpenAI Assistants API to relay commands to the SesameOp malware, which executed them on the victim system, and sent the results back to the threat actor via the same channel. Both commands and results are encrypted. SesameOp cleaned up its tracks by deleting the Assistants and Messages it created and used for communication.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.