{"id":5110,"date":"2025-09-29T18:12:20","date_gmt":"2025-09-29T18:12:20","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=5110"},"modified":"2025-09-29T18:12:20","modified_gmt":"2025-09-29T18:12:20","slug":"xai-sues-openai-alleging-massive-trade-secret-theft-scheme-and-poaching","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=5110","title":{"rendered":"xAI Sues OpenAI, Alleging Massive Trade Secret Theft Scheme and Poaching"},"content":{"rendered":"<p>Elon Musk\u2019s xAI has taken OpenAI to court, alleging a sweeping campaign to plunder its code and business secrets through targeted employee poaching.<\/p>\n<p>The lawsuit, filed in federal court in California, claims OpenAI ran a \u201ccoordinated, unlawful campaign\u201d to misappropriate xAI\u2019s source code and confidential data center strategies, giving it an unfair edge as Grok outperformed ChatGPT.<\/p>\n<h2 class=\"wp-block-heading\">Same recruiter, same pattern<\/h2>\n<p>The <a href=\"https:\/\/www.documentcloud.org\/documents\/26157389-govuscourtscand45686210\/\" target=\"_blank\" rel=\"noopener\">xAI\u2019s complaint references<\/a> three former employees at the center of the alleged scheme, though does not explicitly name them as defendants in this case: engineer Xuechen Li, London-based engineer Jimmy Fraiture, and a senior finance executive who is not identified by name.\u00a0<\/p>\n<p>Li, one of xAI\u2019s earliest engineering hires, allegedly began talks with OpenAI by mid-2025 while still receiving equity and liquidity support from his employer. He signed an offer with OpenAI on Aug. 1, 2025, a timeline xAI says overlapped with unauthorized access and deletion activity on his accounts. (Li is facing a separate trade secret case filed by xAI in August.)<\/p>\n<p>Fraiture allegedly entered OpenAI\u2019s pipeline around the same time. The filing says he signed a non-disclosure agreement with OpenAI days before visiting its offices and a week before accepting a job offer. He officially began work at OpenAI on Sept. 2.<\/p>\n<p>The senior finance executive is accused of carrying over knowledge of xAI\u2019s rapid data-center buildouts, which he reportedly described internally as the company\u2019s \u201csecret sauce.\u201d After only a few months at xAI, he left for a less senior role at OpenAI overseeing spending strategy.<\/p>\n<p>xAI alleges these departures were not routine attrition but part of a coordinated strategy. The same recruiter, Tifa Chen, contacted both Li and Fraiture using the encrypted messaging app Signal, and the complaint points to overlaps in timing, cover-ups, and refusals to certify confidentiality obligations as evidence of a deliberate campaign to extract sensitive know-how.<\/p>\n<h2 class=\"wp-block-heading\">Confession, code dump, and deleted logs<\/h2>\n<p>According to the filing, Li uploaded xAI\u2019s entire code base to a personal cloud account, downloaded it to his laptop, and deleted system logs to conceal the transfer. He later provided a handwritten confession admitting he took the source code and a confidential training slide deck.<\/p>\n<p>Within hours of the upload, the recruiter reacted in disbelief and days later conveyed an offer described as worth \u201cmultiple millions of dollars,\u201d while xAI says Li continued changing passwords and restricting access to accounts tied to the materials.<\/p>\n<p>Fraiture is alleged to have transferred compressed source files via AirDrop from his xAI-issued laptop to a personal device, including inference infrastructure code, experimental folders from founders and staff, and a recording of an internal \u201cAll-Hands\u201d meeting where Elon Musk outlined confidential plans. After initially denying any transfer, he later conceded he had kept the files for weeks.<\/p>\n<p>The senior finance executive refused to sign a termination certification confirming the return and protection of xAI materials and, when pressed, replied with profane, and crude emails.<\/p>\n<h2 class=\"wp-block-heading\">xAI seeks damages and destruction of disputed OpenAI tech<\/h2>\n<p>The lawsuit brings three claims: misappropriation of trade secrets under the federal Defend Trade Secrets Act, intentional interference with prospective economic advantage, and unfair competition under California\u2019s Business and Professions Code.<\/p>\n<p>xAI asks the court for damages, including punitive and trebled damages, along with restitution of any gains OpenAI made from the alleged misconduct. The <a href=\"https:\/\/www.eweek.com\/artificial-intelligence\/ai-companies\/\">AI company<\/a> also seeks injunctions requiring OpenAI to return confidential materials, delete any remaining copies, and destroy any <a href=\"https:\/\/www.eweek.com\/artificial-intelligence\/ai-model-types\/\">AI models<\/a> or technology built with xAI\u2019s code or strategies.<\/p>\n<p>The filing further requests that the court bar OpenAI from continuing what xAI calls unlawful competition and order the removal of any xAI-derived information from OpenAI\u2019s systems. It also demands attorneys\u2019 fees and litigation costs.<\/p>\n<h2 class=\"wp-block-heading\">OpenAI yet to respond as legal clash escalates<\/h2>\n<p>OpenAI has not yet filed a formal response in court but publicly rejected the allegations. A spokesperson for the ChatGPT maker said, \u201cThis new lawsuit is the latest chapter in Mr. Musk\u2019s <a href=\"https:\/\/www.techrepublic.com\/article\/news-openai-elon-musk-harassment-trial-will-proceed\/\" target=\"_blank\" rel=\"noopener\">ongoing harassment<\/a>. We have no tolerance for any breaches of confidentiality, nor any interest in trade secrets from other labs.\u201d<\/p>\n<p>The case adds a fresh chapter to <a href=\"https:\/\/www.techrepublic.com\/article\/news-elon-musk-sam-altman-relationship-timeline\/\" target=\"_blank\" rel=\"noopener\">Musk\u2019s long-running feud with the company<\/a> he co-founded, after earlier clashes over its governance and <a href=\"https:\/\/www.techrepublic.com\/article\/news-openai-restructure-catastrophic-stakes-backlash\/\" target=\"_blank\" rel=\"noopener\">shift to a for-profit model<\/a>.<\/p>\n<p>xAI has demanded a jury trial, with initial hearings expected to determine whether the court will grant early injunctive relief. The outcome may shape not only the dispute between the two rivals but also the competitive landscape in the broader AI race.<\/p>\n<p><a href=\"https:\/\/www.eweek.com\/news\/judge-approves-anthropic-settlement-authors-copyright\/\"><strong>Anthropic\u2019s copyright dispute with authors<\/strong><\/a><strong> just reached a court-approved settlement. See how it may shape the next wave of AI litigation.<\/strong><\/p>\n<p>The post <a href=\"https:\/\/www.eweek.com\/news\/xai-sues-openai-trade-secrets-poaching-lawsuit\/\">xAI Sues OpenAI, Alleging Massive Trade Secret Theft Scheme and Poaching<\/a> appeared first on <a href=\"https:\/\/www.eweek.com\/\">eWEEK<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Elon Musk\u2019s xAI has taken OpenAI to court, alleging a sweeping campaign to plunder its code and business secrets through targeted employee poaching. The lawsuit, filed in federal court in California, claims OpenAI ran a \u201ccoordinated, unlawful campaign\u201d to misappropriate xAI\u2019s source code and confidential data center strategies, giving it an unfair edge as Grok [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-5110","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5110"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5110"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5110\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}