BotBeat
...
← Back

> ▌

OpenAIOpenAI
UPDATEOpenAI2026-05-16

OpenAI Hit by npm Supply Chain Attack, Internal Credentials Stolen from Employee Devices

Key Takeaways

  • ▸OpenAI affected by npm supply chain compromise campaign involving poisoned TanStack packages that reached two employee devices
  • ▸Internal credentials were stolen through credential-focused exfiltration activity, though limited in scope
  • ▸No customer data, production systems, or deployed software were compromised, according to OpenAI
Source:
Hacker Newshttps://www.theregister.com/security/2026/05/15/openai-caught-in-tanstack-npm-supply-chain-chaos-after-employee-devices-compromised/5241019↗

Summary

OpenAI was caught in the "Mini Shai-Hulud" npm supply chain compromise campaign after malware hidden in poisoned TanStack packages reached two employee devices and exposed internal credentials. The attackers, linked to a threat group called TeamPCP, successfully exfiltrated limited credential material from OpenAI code repositories, prompting the company to rotate signing certificates for its desktop products. The company has confirmed that no customer data, production systems, or deployed software were compromised by the incident.

In response, OpenAI is requiring users to update ChatGPT Desktop, Codex App, Codex CLI, and Atlas by June 12, 2026, as new security certificates have been rotated. The incident occurred during a phased rollout of new supply chain security controls, and the two affected employee devices had not yet received updated package management protections that would have blocked the malicious dependencies.

This attack is part of a broader and increasingly aggressive series of npm ecosystem compromises. Security researchers have linked the campaign to TeamPCP, which has systematically targeted npm packages and developer infrastructure to steal credentials including GitHub tokens, cloud secrets, npm publishing credentials, and CI/CD authentication material. TanStack itself confirmed that 84 malicious package versions across 42 packages were published as part of the attack.

  • Users must update ChatGPT Desktop, Codex App, Codex CLI, and Atlas by June 12 following certificate rotations
  • Attack linked to TeamPCP threat group's broader "Mini Shai-Hulud" campaign targeting developer infrastructure across multiple ecosystems
MLOps & InfrastructureCybersecurityRegulation & PolicyPrivacy & Data

More from OpenAI

OpenAIOpenAI
PARTNERSHIP

Malta Becomes First Country to Offer Free ChatGPT Plus Access Through Government Partnership

2026-05-16
OpenAIOpenAI
INDUSTRY REPORT

AI-Generated Research Papers Flood Academic Journals as Detection Becomes Increasingly Difficult

2026-05-16
OpenAIOpenAI
PRODUCT LAUNCH

OpenAI launches ChatGPT for personal finance, will let you connect bank accounts

2026-05-16

Comments

Suggested

AnthropicAnthropic
RESEARCH

Anthropic's Mythos Preview Discovers Critical Apple M5 Memory Exploit

2026-05-16
ModalModal
RESEARCH

Modal Details Five-Year Engineering Effort to Enable Truly Serverless GPU Inference

2026-05-16
OutcryOutcry
RESEARCH

Outcry: A Four-Layer Activist AI Engineered to Run on Older Phones

2026-05-16
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us