
OpenAI has announced a security incident involving Mixpanel, the analytics service used until a few weeks ago for monitoring the API portal. The attack did not affect OpenAI systems or user-generated content. However, some API account profile data may have been exposed.
The company announced the news transparently, emphasizing that the breach does not affect internal infrastructures, models, API keys, or sensitive data.
What Happened: The Attack on Mixpanel Systems
On November 9, 2025, a malicious actor gained unauthorized access to a section of Mixpanel’s infrastructure. The attacker managed to export a dataset containing customer information and analytical data.
Mixpanel notified OpenAI and, on November 25, provided the compromised dataset for analysis.
OpenAI has confirmed that none of the company’s systems have been breached. The issue is confined to the Mixpanel ecosystem.
Which data might have been exposed
According to the preliminary analysis, the incident exclusively involves profile information and browser metadata, including:
- Name associated with the API account
- Email address
- Approximate location (city, state, country)
- Operating system and browser used
- Referring websites (referrer)
- User ID and Organization ID
OpenAI confirms what has not been compromised:
- Password
- API key
- Chat and API requests
- Internal usage data
- Payment methods
- Identification documents
Despite the non-sensitive nature of the information involved, the main risk is linked to potential attempts of targeted phishing.
The Immediate Countermeasures Adopted by OpenAI
After the notification from Mixpanel, OpenAI initiated a multi-level action. The measures taken include:
1. Complete Removal of Mixpanel from Production Systems
OpenAI has permanently discontinued the use of the service.
2. Comprehensive Analysis of the Compromised Dataset
The verification is underway and aims to accurately identify the users involved.
3. Direct Notification to Impacted Accounts
Organizations, administrators, and users will receive a personalized communication.
4. Enhanced Monitoring
So far, no misuse of the stolen data has been detected.
5. Review of the Entire Supplier Ecosystem
OpenAI is strengthening the standards required of vendors, with more stringent audits and heightened security criteria.
What users must do: vigilance against phishing and spoofing
The potentially exposed data – name, email, and API metadata – are often used in phishing campaigns with credible and targeted emails.
OpenAI recommends users to:
- beware of unexpected messages that ask you to click on links or download files
- verify that communications originate from official domains (openai.com)
- remember that OpenAI never asks for API keys, passwords, or codes via email
- enable two-factor authentication (MFA)
The primary threat is the possibility of fraudulent emails that mimic official OpenAI communications.
Why This Incident Matters: The Issue of External Vendors
The Mixpanel incident opens a significant front: even tech companies with secure infrastructures can be exposed to risks originating from external partners.
According to OpenAI, the response was immediate:
termination of the relationship with Mixpanel
review of the entire digital supply chain
strengthening of minimum security requirements
This strategy could soon become a standard in the AI sector, where data streams are increasingly sensitive.
Conclusions
The Mixpanel incident does not constitute a direct breach of OpenAI systems, but it highlights the increasing complexity of security in the technology supply chain. Users are not at immediate risk, but they should be vigilant about potential phishing attempts.
OpenAI reaffirms its commitment to transparency, data protection, and the continuous monitoring of its supplier ecosystem.

3 weeks ago
13






English (US) ·