NEWYou tin present perceive to Fox News articles!
ChatGPT went from novelty to necessity successful little than 2 years. It is present portion of however you work, learn, write, codification and search. OpenAI has said the work has astir 800 cardinal play progressive users, which puts it successful the aforesaid value people arsenic the biggest user platforms successful the world.
When a instrumentality becomes that cardinal to your regular life, you presume the radical moving it tin support your information safe. That spot took a deed precocious aft OpenAI confirmed that idiosyncratic accusation linked to API accounts had been exposed successful a breach involving 1 of its third-party partners.
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide — escaped erstwhile you articulation my CYBERGUY.COM newsletter.

The breach highlights however adjacent trusted analytics partners tin exposure delicate relationship details. (Kurt "CyberGuy" Knutsson)
What you request to cognize astir the ChatGPT breach
OpenAI's notification email places the breach squarely connected Mixpanel, a large analytics supplier the institution utilized connected its API platform. The email stresses that OpenAI's ain systems were not breached. No chat histories, billing information, passwords oregon API keys were exposed. Instead, the stolen information came from Mixpanel's situation and included names, email addresses, Organization IDs, coarse determination and method metadata from idiosyncratic browsers.
FAKE CHATGPT APPS ARE HIJACKING YOUR PHONE WITHOUT YOU KNOWING
That sounds harmless connected the surface. The email calls this "limited" analytics data, but the statement feels similar PR cushioning much than thing else. For attackers, this benignant of metadata is gold. A dataset that reveals who you are, wherever you work, what instrumentality you usage and however your relationship is structured gives menace actors everything they request to tally targeted phishing and impersonation campaigns.
The biggest reddish emblem is the vulnerability of Organization IDs. Anyone who builds connected the OpenAI API knows however delicate these identifiers are. They beryllium astatine the halfway of interior billing, usage limits, relationship hierarchy and enactment workflows. If an attacker quotes your Org ID during a fake billing alert oregon enactment request, it abruptly becomes precise hard to disregard the connection arsenic a scam.
OpenAI's ain reconstructed timeline raises bigger questions. Mixpanel archetypal detected a smishing onslaught connected November 8. Attackers accessed interior systems the adjacent time and exported OpenAI's data. That information was gone for much than 2 weeks earlier Mixpanel told OpenAI connected November 25. Only past did OpenAI alert everyone. It is simply a agelong and worrying soundless period, and it near API users exposed to targeted attacks without adjacent knowing they were astatine risk. OpenAI says it chopped Mixpanel disconnected the adjacent day.
The size of the hazard and the argumentation occupation down it
The timing and the standard substance here. ChatGPT sits astatine the halfway of the generative AI boom. It does not conscionable person user traffic. It has delicate conversations from developers, employees, startups and enterprises. Even though the breach affected API accounts alternatively than user chat history, the vulnerability inactive highlights a wider issue. When a level reaches astir a cardinal play users, immoderate ace becomes a national-scale problem.
Regulators person been informing astir this nonstop scenario. Vendor information is 1 of the anemic links successful modern tech policy. Data extortion laws thin to absorption connected what a institution does with the accusation you springiness them. They seldom supply beardown guardrails astir the full concatenation of third-party services that process this information on the way. Mixpanel is not an obscure operator. It is simply a wide utilized analytics level trusted by thousands of companies. Yet it inactive mislaid a dataset that should ne'er person been accessible to an attacker.
Companies should dainty analytics providers the aforesaid mode they dainty halfway infrastructure. If you cannot warrant that your vendors travel the aforesaid information standards you do, you should not beryllium collecting the information successful the archetypal place. For a level arsenic influential arsenic ChatGPT, the work is adjacent higher. People bash not afloat recognize however galore invisible services beryllium down a azygous AI query. They spot the marque they interact with, not the agelong database of partners down it.

Attackers tin usage leaked metadata to trade convincing phishing emails that look legitimate. (Jaap Arriens/NurPhoto via Getty Images)
8 steps you tin instrumentality to enactment safer erstwhile utilizing AI tools
If you trust connected AI tools each day, it's worthy tightening your idiosyncratic information earlier your information ends up floating astir successful idiosyncratic else's analytics dashboard. You cannot power however each vendor handles your information, but you tin marque it overmuch harder for attackers to people you.
1) Use strong, unsocial passwords
Treat each AI relationship arsenic if it holds thing invaluable due to the fact that it does. Long, unsocial passwords stored successful a reliable password manager trim the fallout if 1 level gets breached. This besides protects you from credential stuffing, wherever attackers effort the aforesaid password crossed aggregate services.
Next, spot if your email has been exposed successful past breaches. Our #1 password manager (see Cyberguy.com/Passwords) prime includes a built-in breach scanner that checks whether your email code oregon passwords person appeared successful known leaks. If you observe a match, instantly alteration immoderate reused passwords and unafraid those accounts with new, unsocial credentials.
Check retired the champion expert-reviewed password managers of 2025 astatine Cyberguy.com.
2) Turn connected phishing-resistant 2FA
AI platforms person go premier targets, truthful they trust connected stronger 2FA. Use an authenticator app oregon a hardware information key. SMS codes tin beryllium intercepted oregon redirected, which makes them unreliable during large-scale phishing campaigns.
3) Use beardown antivirus software
Another important measurement you tin instrumentality to support yourself from phishing attacks is to instal beardown antivirus bundle connected your devices. This tin besides alert you to phishing emails and ransomware scams, helping you support your idiosyncratic accusation and integer assets safe.
The champion mode to safeguard yourself from malicious links that instal malware, perchance accessing your backstage information, is to person beardown antivirus bundle installed connected each your devices. This extortion tin besides alert you to phishing emails and ransomware scams, keeping your idiosyncratic accusation and integer assets safe.
Get my picks for the champion 2025 antivirus extortion winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
PARENTS BLAME CHATGPT FOR SON’S SUICIDE, LAWSUIT ALLEGES OPENAI WEAKENED SAFEGUARDS TWICE BEFORE TEEN’S DEATH
4) Limit what idiosyncratic oregon delicate information you share
Think doubly earlier pasting backstage conversations, institution documents, aesculapian notes oregon addresses into a chat window. Many AI tools store caller past for exemplary improvements unless you opt out, and immoderate way information done outer vendors. Anything you paste could unrecorded connected longer than you expect.
5) Use a data-removal work to shrink your online footprint
Attackers often harvester leaked metadata with accusation they propulsion from people-search sites and aged listings. A bully data-removal work scans the web for exposed idiosyncratic details and submits removal requests connected your behalf. Some services adjacent fto you nonstop customized links for takedowns. Cleaning up these traces makes targeted phishing and impersonation attacks overmuch harder to propulsion off.
While nary work tin warrant the implicit removal of your information from the internet, a information removal work is truly a astute choice. They aren't cheap, and neither is your privacy. These services bash each the enactment for you by actively monitoring and systematically erasing your idiosyncratic accusation from hundreds of websites. It's what gives maine bid of caput and has proven to beryllium the astir effectual mode to erase your idiosyncratic information from the internet. By limiting the accusation available, you trim the hazard of scammers cross-referencing information from breaches with accusation they mightiness find connected the acheronian web, making it harder for them to people you.
Check retired my apical picks for information removal services and get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web by visiting Cyberguy.com.
Get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web: Cyberguy.com.
6) Treat unexpected enactment messages with suspicion
Attackers cognize users panic erstwhile they perceive astir API limits, billing failures oregon relationship verification issues. If you get an email claiming to beryllium from an AI provider, bash not click the link. Open the tract manually oregon usage the authoritative app to corroborate whether the alert is real.

Events similar this amusement wherefore strengthening your idiosyncratic information habits matters much than ever. (Kurt "CyberGuy" Knutsson)
7) Keep your devices and bundle updated
A batch of attacks win due to the fact that devices tally outdated operating systems oregon browsers. Regular updates adjacent vulnerabilities that could beryllium utilized to bargain league tokens, seizure keystrokes oregon hijack login flows. Updates are boring, but they forestall a astonishing magnitude of trouble.
8) Delete accounts you nary longer need
Old accounts beryllium astir with aged passwords and aged data, and they go casual targets. If you're not actively utilizing a peculiar AI instrumentality anymore, delete it from your relationship database and region immoderate saved information. It reduces your vulnerability and limits however galore databases incorporate your details.
Kurt's cardinal takeaway
This breach whitethorn not person touched chat logs oregon outgo details, but it shows however fragile the wider AI ecosystem tin be. Your information is lone arsenic harmless arsenic the slightest unafraid spouse successful the chain. With ChatGPT present approaching a cardinal play users, that concatenation needs tighter rules, amended oversight and less unsighted spots. If anything, this should beryllium a reminder that the unreserved toward AI adoption needs stronger argumentation guardrails. Companies cannot fell down transparent emails aft the fact. They request to beryllium that the tools you trust connected each time are unafraid astatine each layer, including the ones you ne'er see.
Do you spot AI platforms with your idiosyncratic information? Let america cognize by penning to america astatine Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide — escaped erstwhile you articulation my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.










English (CA) ·
English (US) ·
Spanish (MX) ·