OpenAI Confirms Mixpanel Breach Exposed Names, Emails Of Some API Users — Act Now
While core systems remain safe, this data is vulnerable to phishing

OpenAI has confirmed a data breach involving its third-party analytics tool, Mixpanel, that exposed names and email addresses for a portion of its API users. Because this sensitive information is vulnerable to phishing attacks, all affected users must take immediate steps to secure their accounts.
The security event stemmed from a compromise of Mixpanel's systems, not a failure within OpenAI's own infrastructure. This breach allowed an attacker to access and copy a data file containing a small amount of identifying information for certain OpenAI API customers.
Crucial Alert: OpenAI Confirms Mixpanel Data Exposure
Mixpanel initially noticed suspicious activity within a section of its systems. An intruder then managed to extract a file containing customer details alongside their usage data.
Mixpanel promptly alerted OpenAI, which was using the service exclusively for web tracking on the front end of its API product at platform.openai.com. The AI company, led by Sam Altman, stated in a blog post that the security issue had no impact on users of ChatGPT or any of its other offerings.
OpenAI says this wasn't their breach. Technically correct. Strategically irrelevant. Your data was still compromised through their vendor ecosystem.
— Andrew Hatfield (@andrewhatfield) November 27, 2025
Here's what actually happened:
Mixpanel's JavaScript was embedded in platform . openai . com's frontend.
Every login, every… pic.twitter.com/w24fmUyNDZ
Crucially, this did not affect OpenAI's main infrastructure; information such as chat history, API requests, usage statistics, passwords, sign-in details, API keys, payment records, or official identification remains secure.
Mixpanel provided the compromised data to OpenAI on 25 November 2025, enabling OpenAI to begin its own review and contact affected individuals.
Details of Compromised Information
The data file retrieved from Mixpanel's system contained limited account details and platform-specific usage statistics for the openai.com interface.
The exposed information is limited to the following categories:
- The name provided for the API account.
- The email address connected to the API account.
- Rough geographical position inferred from the user's web browser (including city, county, and country).
- The operating system and browser employed when accessing the API account.
- Websites that directed the user to the platform.
- The unique identifiers (IDs) linked to the organisation or the user's API account.
OpenAI's Immediate Action
OpenAI responded swiftly to handle the data exposure. After completing the security assessment, the company promptly disconnected Mixpanel from its active production services. Mixpanel CEO Jen Taylor explained that the company identified a 'smishing' attack and immediately launched its emergency response procedures.
'We took comprehensive steps to contain and eradicate unauthorised access and secure impacted user accounts. We engaged external cybersecurity partners to remediate and respond to the incident,' the top executive confirmed in a blog post.
Despite these efforts, OpenAI confirmed it has stopped using Mixpanel. The focus now is on directly informing all affected groups, including organisations, administrators, and individual users, through email.
Dammit! Just got a data breach notification from @OpenAI related to @mixpanel: pic.twitter.com/y8shHPTOPU
— Troy Hunt (@troyhunt) November 27, 2025
OpenAI stated that although no evidence of data misuse has been found, it is still actively monitoring for any signs of related malicious activity.
In addition, the company announced that it is undertaking broader, more thorough security checks across its entire network of suppliers and increasing security standards for all external partners.
Key Actionable Steps for API Users
The exposed details, which include your name, email address, and account metadata, could be used by criminals in phishing or social engineering attempts targeting you or your organisation.
OpenAI is urging all API users to stay alert for any suspicious communication. This involves treating any unexpected emails or messages with extreme care, particularly those that include links or attachments.
Users must always confirm that any message claiming to be from OpenAI actually originates from an official company domain. It is crucial to remember that OpenAI will never ask for sensitive information such as passwords, API keys, or verification codes via email, text, or chat.
Lastly, although no passwords were leaked in this event, activating Multi-Factor Authentication (MFA) is still essential for protecting accounts from unwanted access; organisations should implement MFA through their single sign-on system.
No Need to Reset
OpenAI is not advising users to change their passwords or generate new API keys since those elements were not compromised in the breach. If users have any further concerns, OpenAI encourages them to contact its support team.
© Copyright IBTimes 2025. All rights reserved.





















