OpenAI rotates macOS certs after Axios attack hit code-signing workflow
好的,我现在需要帮用户总结这篇文章的内容。用户的要求是用中文,控制在100字以内,不需要特定的开头,直接写描述即可。 首先,我仔细阅读了文章内容。文章主要讲述了OpenAI在最近的一次供应链攻击中,GitHub Actions工作流下载并执行了一个被恶意篡改的Axios包。这个包导致了潜在的macOS代码签名证书泄露。虽然OpenAI调查后没有发现证书被滥用的证据,但出于谨慎考虑,他们决定撤销并轮换这些证书。 接下来,我需要提取关键信息:供应链攻击、GitHub Actions工作流、恶意Axios包、macOS代码签名证书、潜在泄露、撤销轮换证书。 然后,我需要将这些信息简洁地整合成一段不超过100字的文字。确保涵盖事件的时间、影响范围(macOS应用)、采取的措施(撤销证书)以及对其他平台的影响(不影响)。 最后,检查字数是否符合要求,并确保语言通顺自然。 </think> OpenAI因GitHub Actions工作流下载恶意Axios包导致潜在macOS代码签名证书泄露,已撤销并轮换证书以确保应用安全。 2026-4-13 17:46:42 Author: www.bleepingcomputer.com(查看原文) 阅读量:25 收藏

OpenAI

OpenAI is rotating potentially exposed macOS code-signing certificates after a GitHub Actions workflow executed a malicious Axios package during a recent supply chain attack.

The company said that on March 31, 2026, the legitimate workflow downloaded and executed a compromised Axios package (version 1.14.1) that was used in attacks to deploy malware on devices.

That workflow had access to code-signing certificates used to sign OpenAI's macOS apps, including ChatGPT Desktop, Codex, Codex CLI, and Atlas.

Wiz

While OpenAI says its investigation found no evidence that the signing certificate was compromised, the company is treating it as potentially compromised out of caution and is now revoking and rotating it.

"Out of an abundance of caution we are taking steps to protect the process that certifies our macOS applications are legitimate OpenAI apps. We found no evidence that OpenAI user data was accessed, that our systems or intellectual property was compromised, or that our software was altered," explains an OpenAI security advisory.

"We are updating our security certificates, which will require all macOS users to update their OpenAI apps to the latest versions."

macOS users will need to update their apps to versions signed with the new certificate, as older versions may stop working on May 8, 2026.

OpenAI worked with a third-party incident response firm to conduct an investigation, which found no evidence that the incident exposed its certificates or that they were used to distribute malicious software. The company also analyzed previous notarization activity linked to the certificate and confirmed that everything signed with it was legitimate.

However, if the attacker obtained the certificate, they could use it to sign their own macOS applications that appear to be legitimately signed by OpenAI.

Therefore, to reduce the risk, OpenAI says it is working with Apple to ensure no future software can be notarized with the previous certificate.

OpenAI says that the certificate will be fully revoked on May 8, after which attempts to launch applications signed with it will be blocked by macOS protections.

OpenAI says the issue is limited to its macOS applications and does not affect its web services or apps on iOS, Android, Windows, or Linux. It also says user accounts, passwords, and API keys were not impacted.

Users are advised to update via in-app features or the official download pages, and to avoid installing software from links sent via email, ads, or third-party sites.

The company says it will continue monitoring for any signs that the old certificate is being misused and may speed up the revocation timeline if anything suspicious is detected.

The Axios supply chain attack has been linked to North Korean threat actors tracked as UNC1069, who conducted a social engineering campaign against one of the project's maintainers.

After conducting a fake web conference call that led to the installation of malware, the threat actors gained access to the maintainer's account and published malicious versions of the Axios package to npm.

This malicious package included a dependency that installed a remote access trojan (RAT) on macOS, Windows, and Linux systems.

According to researchers, the attackers approached developers through convincing fake collaboration setups, including Slack workspaces and Microsoft Teams calls, eventually tricking them into installing malware that led to credential theft and downstream supply chain compromises.

The activity has been linked to a larger campaign to compromise popular open-source projects for widespread supply chain attacks.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/openai-rotates-macos-certs-after-axios-attack-hit-code-signing-workflow/
如有侵权请联系:admin#unsafe.sh