
Summary
The detection rule titled 'OpenAI Anomalous API Key Activity' aims to identify suspicious activities related to OpenAI API keys that could indicate potential compromise or malicious use. It specifically looks for anomalous API key creation or updates that grant elevated or unrestricted permissions. These types of API keys have detrimental implications as they allow access to powerful language model capabilities, making them attractive to attackers. The rule considers events like the creation of API keys with permissions such as 'models:write', 'organization:write', or 'admin'. If such activities are detected, alerts are generated, which require immediate investigation to verify the legitimacy of the actions taken by users or service accounts. The key elements of investigation include the identity behind the API key operations, the permissions granted to the API keys, and any unusual patterns in API usage.
Categories
- Cloud
- Application
- Identity Management
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1078
- T1098
- T1550
- T1071
Created: 2026-01-13