Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Warns: Hackers Use AI to Create Zero- Using Working
May 11, 2026
Go Library fsnotify: Supply Chain Alarms After Access Changes
May 11, 2026
Hackers Use PlugX DLL Sideloading in PlugX-Like Chain
May 11, 2026
Home/CyberSecurity News/OpenAI Urges macOS Users: Update ChatGPT & Warns Codex
CyberSecurity News

OpenAI Urges macOS Users: Update ChatGPT & Warns Codex

OpenAI has disclosed a security incident resulting from a broader software supply chain attack, detected on March 31, 2026. The incident involved the compromise of Axios, a widely used third-party...

Marcus Rodriguez
Marcus Rodriguez
April 11, 2026 3 Min Read
6 0

OpenAI has disclosed a security incident resulting from a broader software supply chain attack, detected on March 31, 2026. The incident involved the compromise of Axios, a widely used third-party JavaScript developer library.

While the company confirmed no user data, API keys, or systems were compromised, it is taking aggressive precautionary measures to protect its macOS application certification infrastructure.

On March 31, 2026 (UTC), threat actors believed to be linked to North Korea hijacked the npm account of an Axios library maintainer and pushed malicious updates, specifically versions v1.14.1 and v0.30.4.

These compromised versions silently introduced a hidden dependency called plain-crypto-js, which functioned as a cross-platform Remote Access Trojan (RAT) capable of targeting Windows, macOS, and Linux environments.

According to Palo Alto Networks’ Unit 42, the malware was engineered to perform system reconnaissance, establish persistence, and then self-destruct to evade forensic detection.

Axios is one of the most widely downloaded JavaScript libraries, with over 100 million weekly downloads, making the blast radius of this supply chain attack particularly significant.

OpenAI’s Incident Response

OpenAI’s internal build pipeline leveraged Axios as part of its GitHub Actions workflow. When the workflow automatically pulled the now-malicious Axios update, the compromised library gained access to certificate and notarization material used to digitally sign OpenAI’s macOS applications, including ChatGPT Desktop, Codex, and Atlas.

This type of access is critical: code-signing certificates are the trust anchors that verify to Apple’s systems and the App Store that an application is genuinely from its claimed publisher.

Had an attacker exploited this access, they could theoretically have fabricated counterfeit OpenAI applications carrying a legitimate certificate, deceiving both end-user devices and the App Store into treating them as authentic. OpenAI confirmed the root cause was a misconfiguration in its GitHub Actions workflow, which has since been remediated.

We recently identified a security issue involving the third-party developer library Axios that was part of a broader industry incident. We found no evidence that OpenAI user data was accessed, that our systems were compromised, or that our software was altered.

Out of an…

— OpenAI (@OpenAI) April 11, 2026

OpenAI has moved quickly to contain the potential fallout. The company is revoking and rotating all macOS security certificates to invalidate any trust material that may have been exposed during the incident.

All macOS users are now required to update their OpenAI applications ChatGPT, Codex, Atlas, and Codex CLI to the latest versions to receive the refreshed certificates. OpenAI emphasized that users do not need to change passwords, as passwords and API keys were entirely unaffected by this incident.

Critically, after May 8, 2026, older versions of these macOS applications will cease to receive updates and support, and may become fully non-functional. Users can update safely via an in-app update prompt or through official download links provided by OpenAI.

The attack’s impact on OpenAI was confined exclusively to macOS applications. Applications on Android, Linux, and Windows platforms were not affected. OpenAI reiterated that it found no evidence of user data exfiltration, system compromise, or software tampering.

This incident underscores the growing threat of software supply chain attacks targeting developer tooling, a vector increasingly favored by sophisticated state-linked threat actors.

Organizations relying on open-source libraries via automated CI/CD pipelines should implement dependency pinning, integrity verification, and workflow audits as standard security hygiene to reduce exposure to similar incidents.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Google Launches Gmail E2EE for Android and iOS Users

Next Post

WhatsApp’s ‘End-to-End Encryption by Default’ Claim Called

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
ShinyHunters Breaches Instructure Canvas LMS Free-
May 11, 2026
Hugging Face Repo with 200k Downloads Inst Trending Repository
May 11, 2026
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us