What's Happening?
OpenAI has been identified as one of the organizations impacted by a recent supply chain attack linked to North Korean hackers. The attack involved the compromise of the NPM account of a lead maintainer of Axios, a popular JavaScript HTTP client library.
Malicious NPM packages were published, capable of executing a cross-platform remote access tool (RAT) on Windows, macOS, and Linux systems. OpenAI discovered that a GitHub Actions workflow used in its macOS app-signing process downloaded and executed a malicious version of Axios. Although OpenAI believes its macOS signing certificate was not compromised, it has decided to revoke and rotate the certificate as a precaution. The attack has raised concerns about the potential for malicious code to be signed and disguised as legitimate OpenAI software.
Why It's Important?
This incident underscores the vulnerabilities inherent in software supply chains, particularly those involving widely used open-source libraries like Axios. The potential compromise of OpenAI's signing certificate could have allowed attackers to distribute malicious software under the guise of legitimate OpenAI applications, posing significant security risks to users. The attack highlights the need for robust security measures and vigilance in managing software dependencies, especially for organizations handling sensitive data and applications. The involvement of North Korean hackers, known for cryptocurrency theft, adds a layer of geopolitical complexity, emphasizing the intersection of cybersecurity and international relations.
What's Next?
OpenAI plans to fully revoke its compromised certificate by May 8, 2026, to prevent unauthorized software notarizations. This move will block new downloads and launches of apps signed with the old certificate by macOS security protections. Organizations affected by the Axios attack are likely to conduct thorough investigations and enhance their security protocols to prevent future incidents. The broader tech community may also push for improved security practices in managing open-source dependencies and supply chain integrity.











