ChatGPT Faces Widespread Outage Impacting Thousands Of Users - 1

Image by Jonathan Kemper, from Unsplash

ChatGPT Faces Widespread Outage Impacting Thousands Of Users

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

ChatGPT faced a major outage on Tuesday, June 10, 2025, affecting many users worldwide.

In a rush? Here are the quick facts:

  • ChatGPT experienced a major outage on June 10, 2025.
  • Nearly 2,000 outage reports appeared on Downdetector.
  • Users received error messages like “Too many concurrent requests.”

The website Downdetector recorded 2,000 reports of internet service problems during this time. Users encountered both “Too many concurrent requests” errors, as well as cases where the chatbot failed to respond.

OpenAI’s status page showed “elevated error rates” lasting for over seven hours. Early Tuesday morning, the company said, “Some users are experiencing elevated error rates and latency across the listed services. We are continuing to investigate this issue.”

We are observing elevated error rates and latency across ChatGPT and the API. Our engineers have identified the root cause and are working as fast as possible to fix the issue. For updates see our status page: https://t.co/oUGSSyltRU — OpenAI (@OpenAI) June 10, 2025

OpenAI provided an update about finding the source of the problem while they worked on implementing a fix. The company stated that the complete recovery process for all listed services would need additional time of three hours.

A couple of hours later, OpenAI announced it had found the root cause and was “working on implementing a mitigation.” However, it warned, “Full recovery across all listed services may take another few hours.”

The Independent reports that users took to social media to post pictures of their chatbot sessions that displayed both “Hmmm… something seems to have gone wrong” and “network error” messages prompting them to check their connection status.

New Rust-Based Malware Steals Passwords from Fake Gaming Sites - 2

Image by Samsung Memory, from Unsplash

New Rust-Based Malware Steals Passwords from Fake Gaming Sites

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

Myth Stealer is a Rust-based malware spreading through fake gaming sites, tricking users with fake windows and stealing sensitive browser and app data.

In a rush? Here are the quick facts:

  • Distributed via fake gaming sites using password-protected archives or standalone files.
  • Malware shows fake windows to trick users while stealing sensitive data silently.
  • Uses string obfuscation and sandbox evasion to avoid detection by security software.

The Trellix Advanced Research Center discovered Myth Stealer as a dangerous malware, which developers built using the Rust programming language. The malware first appeared on Telegram during late December 2024 as a free trial, before transitioning to a paid subscription service.

The malware primarily spreads through fake gaming websites, which present themselves as game-related software to deceive users. The malware displays a deceptive interface to victims, making them believe the application is secure while it steals crucial data, including passwords, cookies, and autofill information from Chrome and Firefox browsers.

Researchers explain, “The malware authors regularly update stealer code to evade AV detection and introduce additional functionality such as screen capture capability and clipboard hijacking.”

The malware employs sophisticated methods to conceal itself through code string obfuscation and sandbox detection, evading security tool analysis. The malware attempts to gain administrative privileges to steal additional data, while hijacking the clipboard to substitute cryptocurrency wallet addresses, resulting in users sending money to attackers.

The malware transfers all stolen data to its command server, occasionally uploading screenshots of the compromised computer system.

The malware operators use Telegram channels to market their product through cryptocurrency payments and Razer Gold credit transactions. The Telegram groups operated separately to sell stolen accounts until Telegram took them down.

Experts warn, “The consistent development and enhancement of Myth Stealer underscore the attackers’ determination to stay ahead of security defenses, posing a serious and persistent risk to users.”

You should prevent software downloads from untrusted websites while maintaining current security software updates.