OpenAI has confirmed that some of its users may have been affected by a recent data breach at Mixpanel, a prominent product analytics and event-tracking platform.
Mixpanel disclosed the incident on November 27, stating that the breach was first detected on November 8 and involved a “smishing campaign” targeting a limited number of its customers. The company has since taken steps to secure affected accounts, including rotating compromised credentials, revoking active sessions, resetting employee passwords, and blocking suspicious IP addresses.
While Mixpanel has provided minimal technical details about the attack, OpenAI clarified the implications for its users. According to OpenAI, the breach did not compromise its internal infrastructure, ChatGPT chat content, prompts, responses, API usage data, passwords, API keys, payment details, or government IDs.
However, the attackers did gain access to a dataset containing limited customer information and analytics data collected through OpenAI’s use of Mixpanel for product usage tracking on platform.openai.com. The exposed data reportedly includes user names, email addresses, approximate locations (city, state, and country), operating systems and browsers, organization or user IDs, and referring websites.
OpenAI emphasized that while no sensitive financial or authentication information was exposed, the compromised data could still be exploited for phishing or social engineering attacks. In response, OpenAI has removed Mixpanel from its production services, reviewed the affected datasets, and is collaborating closely with Mixpanel and other partners to assess the full scope of the incident. The company is also actively notifying affected users, organizations, and administrators.
“While we have found no evidence of any effect on systems or data outside Mixpanel’s environment, we continue to monitor closely for any signs of misuse,” OpenAI stated.
This incident underscores the ongoing cybersecurity challenges faced by organizations relying on third-party analytics and tracking tools. Users are advised to remain vigilant for suspicious emails or communications that could be linked to the breach.