Close Menu
    Facebook X (Twitter) Instagram
    Articles Stock
    • Home
    • Technology
    • AI
    • Pages
      • About ArticlesStock — AI & Technology Journalist
      • Contact us
      • Disclaimer For Articles Stock
      • Privacy Policy
      • Terms and Conditions
    Facebook X (Twitter) Instagram
    Articles Stock
    AI

    OpenAI says hackers stole some information after newest code safety concern

    Naveed AhmadBy Naveed Ahmad14/05/2026Updated:14/05/2026No Comments3 Mins Read
    openai logo code background


    Earlier this week, hackers hijacked several open source projects utilized by dozens of firms and pushed updates designed to unfold malware. That is the newest in a string of latest so-called “provide chain” assaults focusing on software program builders and their initiatives.

    On Wednesday, OpenAI confirmed that two workers had their units “impacted by this assault.” However, after an investigation, the corporate stated in a blog post that it discovered “no proof that OpenAI consumer information was accessed, that our manufacturing techniques or mental property have been compromised, or that our software program was altered.”

    OpenAI stated that workers’ units have been compromised by an earlier assault on TanStack, a preferred open supply library that helps builders construct internet apps. 

    On Monday, TanStack disclosed the attack and printed a autopsy, saying hackers printed 84 malicious variations of its software program throughout a six-minute window. The challenge stated a researcher detected the assault inside 20 minutes. The malicious TanStack variations included malware that was designed to steal credentials from computer systems that the software program was put in on, and self-propagate to unfold to different techniques. 

    Contact Us

    Do you’ve got extra details about this provide chain assault? Or different provide chain compromises? From a non-work machine, you possibly can contact Lorenzo Franceschi-Bicchierai securely on Sign at +1 917 257 1382, or by way of Telegram and Keybase @lorenzofb, or electronic mail.

    On its half, OpenAI stated that it noticed unauthorized entry and theft of credentials “in a restricted subset of inside supply code repositories to which the 2 impacted workers had entry.”

    In keeping with the AI large, “solely restricted credential materials” was taken from the affected code repositories. As a precaution, provided that the affected repositories contained digital certificates used to signal OpenAI’s merchandise, the corporate stated it’s rotating the certificates “as a precaution,” which would require macOS customers to replace the app. 

    “We now have discovered no proof of compromise or danger to current software program installations,” the corporate wrote.

    It is not clear who’s behind the TanStack assault. A few of the previous provide chain hacks have been attributed to a hacking gang often called TeamPCP, a bunch that was itself a goal of hackers. 

    However there have been different teams which have employed the identical techniques in opposition to different initiatives. In March, North Korean hackers hijacked Axios, a preferred open supply improvement instrument, and pushed malware that would have contaminated thousands and thousands of builders. And in Might, Chinese language hackers have been accused of an identical assault focusing on hundreds of Home windows computer systems working disc imaging software program Daemon Instruments.

    In these assaults, as an alternative of focusing on particular firms, hackers take over open supply initiatives and push out malware disguised as innocuous common updates. This enables them to doubtlessly compromise dozens of targets with only one hack, spreading the harm throughout the web.

    Once you buy via hyperlinks in our articles, we might earn a small fee. This doesn’t have an effect on our editorial independence.



    Source link

    Naveed Ahmad

    Naveed Ahmad is a technology journalist and AI writer at ArticlesStock, covering artificial intelligence, machine learning, and emerging tech policy. Read his latest articles.

    Related Posts

    A Coding Information Implementing SHAP Explainability Workflows with Explainer Comparisons, Maskers, Interactions, Drift, and Black-Field Fashions

    17/05/2026

    Nous Analysis Proposes Lighthouse Consideration: A Coaching-Solely Choice-Primarily based Hierarchical Consideration That Delivers 1.4–1.7× Pretraining Speedup at Lengthy Context

    17/05/2026

    $60B AI chip darling Cerebras nearly died early on, burning $8M a month

    17/05/2026
    Leave A Reply Cancel Reply

    Categories
    • AI
    Recent Comments
      Facebook X (Twitter) Instagram Pinterest
      © 2026 ThemeSphere. Designed by ThemeSphere.

      Type above and press Enter to search. Press Esc to cancel.