{"id":13746,"date":"2026-04-14T05:33:05","date_gmt":"2026-04-14T05:33:05","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13746"},"modified":"2026-04-14T05:33:05","modified_gmt":"2026-04-14T05:33:05","slug":"openai-rotates-macos-certificates-following-axios-provide-chain-breach","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13746","title":{"rendered":"OpenAI Rotates macOS Certificates Following Axios Provide Chain Breach"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>OpenAI has rotated the code-signing certificates for its Mac functions after a <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/global-hack-exposes-personal-data-protection-axios-security-group\/\" data-type=\"post\" data-id=\"115636\">provide chain assault<\/a> compromised a software program library known as Axios. The difficulty was detected on 31 March 2026 when hackers hijacked the account of the lead developer for Axios, Jason Saayman. <\/p>\n<p>To your data, Axios is extensively utilized by builders to assist functions talk with servers; it&#8217;s presently utilized in roughly 80% of cloud environments and receives round 100 million weekly downloads.<\/p>\n<p>This newest improvement follows <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/hackers-poison-axios-npm-package-100m-downloads\/\">earlier reporting<\/a> from Hackread.com in March, which defined how hackers bypassed customary npm and GitHub safety checks to publish malicious Axios variations 1.14.1 and 0.30.4. <\/p>\n<p>These variations contained a backdoor named <code>WAVESHAPER.V2<\/code>. It was hidden inside a faux dependency known as plain-crypto-js. The malware was stay for under three hours, however the first an infection occurred simply 89 seconds after it was posted. And now, OpenAI has confirmed that its automated techniques fetched this compromised code throughout that quick time frame.<\/p>\n<h3 id=\"why-openai-is-rotating-its-certificates\" class=\"wp-block-heading\"><strong>Why OpenAI is rotating its certificates<\/strong><\/h3>\n<p><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/tag\/OpenAI\/\" data-type=\"post_tag\" data-id=\"26559\">OpenAI<\/a> confirmed that its inner construct pipeline unintentionally downloaded the malicious Axios 1.14.1 model through the March assault. As a result of this surroundings has entry to the code-signing certificates, which confirm that OpenAI\u2019s software program is genuine and untampered, the corporate should deal with these credentials as probably compromised. The affected functions embody: ChatGPT Desktop, Codex, Codex-cli, and Atlas.<\/p>\n<p>In keeping with OpenAI\u2019s <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/openai.com\/index\/axios-developer-tool-compromise\/\">official response<\/a> to this incident, the hackers in all probability didn\u2019t have sufficient time to steal these certificates recordsdata. The corporate claims that they discovered no proof that consumer knowledge was accessed or that their software program was modified. Nevertheless, they&#8217;re nonetheless treating the certificates as compromised and revoking them, switching to new ones.<\/p>\n<p>\u201cOur evaluation of the incident concluded that the signing certificates current on this workflow was seemingly not efficiently exfiltrated by the malicious payload as a result of timing of the payload execution, certificates injection into the job, sequencing of the job itself, and different mitigating elements. However, out of an abundance of warning, we&#8217;re treating the certificates as compromised and are revoking and rotating it,\u201d the corporate said.<\/p>\n<h3 id=\"important-update-deadline-for-users\" class=\"wp-block-heading\"><strong>Essential replace deadline for customers<\/strong><\/h3>\n<p><a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/openai-codex-vulnerability-steal-github-tokens\/\">OpenAI <\/a>has launched patched variations of their apps with new certificates to make sure customers aren\u2019t working insecure code. From 8 Might 2026, macOS will begin blocking any variations utilizing the previous, revoked certificates; subsequently, updating to the newest, re-signed model is necessary for all, and be sure to are utilizing these particular variations or newer:<\/p>\n<ul class=\"wp-block-list is-style-cnvs-list-styled-positive\">\n<li>Atlas: 1.2026.84.2<\/li>\n<li>Codex CLI: 0.119.0<\/li>\n<li>Codex App: 26.406.40811<\/li>\n<li>ChatGPT Desktop: 1.2026.071<\/li>\n<\/ul>\n<p>This assault has been attributed to a North Korea-linked group often called <a rel=\"nofollow\" target=\"_blank\" target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/unc1069-node-js-maintainer-fake-linkedin-slack-profile\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/unc1069-node-js-maintainer-fake-linkedin-slack-profile\/\">UNC1069<\/a>. Normally, this group\u2019s assaults are centered on stealing cryptocurrency, however this time, they focused a software program library. They in all probability now wish to attain inner techniques at corporations like OpenAI and entry high-value signing keys and credentials which can be normally unreachable by means of direct assaults. Well timed software program updates stay your main protection towards such infrastructure-level threats.<\/p>\n<p>\n\t\t\t<\/div>\n<p><template id="srDxKpmICVDN0bkWDNG3"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>OpenAI has rotated the code-signing certificates for its Mac functions after a provide chain assault compromised a software program library known as Axios. The difficulty was detected on 31 March 2026 when hackers hijacked the account of the lead developer for Axios, Jason Saayman. To your data, Axios is extensively utilized by builders to assist [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13748,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[8666,641,1129,241,2858,82,8665,240],"class_list":["post-13746","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-axios","tag-breach","tag-certificates","tag-chain","tag-macos","tag-openai","tag-rotates","tag-supply"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13746"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13746\/revisions"}],"predecessor-version":[{"id":13747,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13746\/revisions\/13747"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13748"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-14 11:57:22 UTC -->