Data Breaches

OpenAI Revokes macOS Cert After Axios Hack

Imagine your AI empire's signing keys brushing shoulders with North Korean malware. OpenAI just did—and revoked everything to be safe.

OpenAI logo with cracked macOS app icon and North Korean flag overlay

Key Takeaways

  • OpenAI's workflow hit malicious Axios 1.14.1 but likely didn't leak signing cert due to timing.
  • All old macOS apps lose support post-May 2026; update to new versions now.
  • March's dual attacks (Axios + Trivy) highlight open-source fragility for AI infrastructure.
  • Prediction: AI mandates for secure supply chains by 2027, mirroring SolarWinds fallout.

Over 1.27 million weekly downloads. That’s Axios, the HTTP client darling of JavaScript devs, right before North Korean hackers turned it into a backdoor bomb on March 31.

And OpenAI? Caught in the blast radius.

Look, this isn’t just another npm hiccup. It’s a neon sign flashing ‘supply chain hell’ for AI’s gold rush era. OpenAI’s GitHub Actions workflow—tasked with notarizing ChatGPT Desktop and other macOS apps—sucked in the tainted Axios 1.14.1. That version? Laced with plain-crypto-js, unleashing WAVESHAPER.V2, a cross-platform beast eyeing Windows, macOS, Linux. But here’s the twist: OpenAI dodged the bullet. No user data swiped, no IP pilfered, no code twisted.

Still, they’re yanking the cert like it’s radioactive.

What Happened in OpenAI’s Workflow Nightmare?

Picture this: your CI/CD pipeline, humming along, grabs a library everyone trusts. Boom—North Korea’s UNC1069 slips in via the maintainer’s hijacked npm account. Two poisoned releases later, backdoors deploy. OpenAI’s workflow had the keys to the kingdom: certificates for signing ChatGPT Desktop, Codex, Codex CLI, Atlas.

Yet, timing saved them. “Our analysis of the incident concluded that the signing certificate present in this workflow was likely not successfully exfiltrated by the malicious payload due to the timing of the payload execution, certificate injection into the job, sequencing of the job itself, and other mitigating factors,” OpenAI explained.

“Out of an abundance of caution, we are taking steps to protect the process that certifies our macOS applications are legitimate OpenAI apps,” OpenAI said. “We found no evidence that OpenAI user data was accessed, that our systems or intellectual property were compromised, or that our software was altered.”

Smart move. They’re revoking it anyway. Starting May 8, 2026—wait, 2026?—older macOS apps get the boot from updates, support, even launching. macOS security will block ‘em cold. New safe versions? ChatGPT Desktop 1.2026.071 and crew. They’re looping in Apple to nix fresh notarizations with the old cert.

Why the long fuse to 2026? User mercy—30 days to update without chaos.

But peek deeper. If hackers nabbed that cert? They could’ve masqueraded malware as legit OpenAI software. Chilling.

Why March Was Supply Chain Armageddon

Axios wasn’t solo. March saw two gut-punches to open-source guts. Trivy, Aqua’s vulnerability scanner, got mauled by TeamPCP (UNC6780). Credential stealer SANDCLOCK ripped secrets, spawning CanisterWorm across ecosystems. Then, pivot city: stolen creds hit Checkmarx GitHub Actions, LiteLLM, Telnyx on PyPI.

Trend Micro nailed it: “In just eight days, the actor has pivoted across security scanners, AI infrastructure, and now telecommunications tooling, evolving their delivery from inline Base64 to .pth auto-execution, and ultimately to split-file WAV steganography, while also expanding from Linux-only to dual-platform targeting with Windows persistence.”

Windows victims? Telnyx SDK dropped msbuild.exe—obfuscated hell, steganography in PNGs loading DonutLoader shellcode.

This duo? Axios for broad HTTP chaos, Trivy for deep infra digs. North Koreans and cybercriminals tag-teaming the stack.

And OpenAI? Ground zero for AI’s vulnerability.

Here’s my hot take—the one nobody’s shouting yet: this echoes the 2014 SolarWinds wake-up, but turbocharged for AI’s dependency frenzy. Back then, nation-states probed enterprise. Now? They’re feasting on AI pipelines, where one lib owns the world. Bold prediction: by 2027, we’ll see AI-specific supply chain mandates, like locked-down workflows or blockchain-signed deps. OpenAI’s PR spins ‘abundance of caution’—fair, but it’s a band-aid on a hemorrhaging ecosystem. They’re not calling out npm’s fragility or pushing for collective defense. Skeptical futurist hat on: without it, AI’s platform shift stalls at trust’s graveyard.

How Bad Could This Have Been for AI Users?

Real talk—massive. Signed malware posing as ChatGPT? Users sideload it, thinking it’s golden. Backdoors phone home, exfiltrate chats, API keys, your wildest prompts. For OpenAI, reputational nuke. Imagine headlines: ‘North Korea Hacks ChatGPT via Mac App.’ Stock dips, regulators swarm, users bolt to Claude or Gemini.

But they mitigated. Rotated certs, force-updated apps, Apple collab. Props. Still, that 2026 date? Feels like kicking the can—why not sooner? (Whisper: enterprise rollout lags.)

Energy here: AI’s not invincible. It’s a towering Jenga stack of open-source libs, one wobble from tumble. Yet, that’s the beauty—rapid iteration breeds magic. Fix this, and we’re golden.

Supply chain attacks thrive on trust. Axios: 1.27M downloads/week. Trivy: dev darling. Hackers bet we’ll grab-and-go. We’re waking up, though. Tools like Sigstore, SLSA frameworks—OpenAI should evangelize ‘em.

Wonder this: what if this sparks AI’s ‘secure by design’ era? Like TCP/IP taming the early net’s wild west.

Is OpenAI Overreacting or Just Smart?

Overreacting? Nah. Smart as hell. “In the event that the certificate was successfully compromised by a malicious actor, they could use it to sign their own code, making it appear as legitimate OpenAI software,” they warned. Exactly.

Critique time: their post’s buttoned-up, zero blame on Axios maintainers or npm. Corporate polish—sure—but misses the rally cry for ecosystem overhaul. As futurist, I say seize it: OpenAI, lead the charge for verified supply chains. Your scale demands it.

Short para punch: Users, update now.

And devs? Audit your workflows. North Korea’s watching.

This incident? Catalyst. AI’s platform shift demands ironclad trust. We’re building the future—don’t let hackers notarize it.


🧬 Related Insights

Frequently Asked Questions

What happened in the OpenAI Axios supply chain attack? OpenAI’s macOS app-signing workflow downloaded a malicious Axios npm package injected by North Korean hackers, but no data was compromised.

Will my OpenAI macOS apps stop working after May 8, 2026? Yes, older versions signed with the revoked certificate will be blocked by macOS unless updated to the latest safe releases like ChatGPT Desktop 1.2026.071.

How can I protect against supply chain attacks like Axios? Pin dependencies strictly, use tools like Dependabot for alerts, and audit CI/CD workflows for secret exposure.

Wei Chen
Written by

Technical security analyst. Specialises in malware reverse engineering, APT campaigns, and incident response.

Frequently asked questions

What happened in the OpenAI <a href="/tag/axios-supply-chain-attack/">Axios supply chain attack</a>?
OpenAI's macOS app-signing workflow downloaded a malicious Axios npm package injected by North Korean hackers, but no data was compromised.
Will my OpenAI macOS apps stop working after May 8, 2026?
Yes, older versions signed with the revoked certificate will be blocked by macOS unless updated to the latest safe releases like ChatGPT Desktop 1.2026.071.
How can I protect against supply chain attacks like Axios?
Pin dependencies strictly, use tools like Dependabot for alerts, and audit CI/CD workflows for secret exposure.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by The Hacker News

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.