Third-Party Analytics Provider Compromises OpenAI User Data
OpenAI confirmed on Wednesday that a security incident at analytics provider Mixpanel earlier this month exposed account names, email addresses, and browser location data for some users of OpenAI’s API. The breach occurred on November 8 when an unknown attacker gained access to Mixpanel’s systems and exported a dataset containing customer-identifiable metadata.
According to Mixpanel’s statement, the stolen information included usernames, email addresses, approximate browser-based location, operating system details, and browser specifications. However, OpenAI was quick to clarify that the breach did not include users’ actual prompts, API keys, payment information, or authentication tokens.
I think what’s particularly concerning here is that this wasn’t a direct breach of OpenAI’s systems, but rather a third-party service they were using. It raises questions about how much data companies are sharing with their analytics partners.
Limited Scope But Significant Concerns
Only data from users who accessed OpenAI’s technology through the API—meaning external applications powered by GPT—was affected. If you’ve been using ChatGPT directly through OpenAI’s website, you’re probably in the clear. But for developers and businesses building on OpenAI’s API, this is a serious matter.
The real worry, as OpenAI acknowledged, is that cybercriminals could use this stolen metadata for targeted phishing attempts. When attackers have your name, email, and even your approximate location, they can craft much more convincing phishing messages.
OpenAI said they’ve removed Mixpanel from their production services and are working closely with the analytics company to understand the full scope of the incident. They’re also notifying all impacted customers, which is the responsible thing to do.
Mixpanel’s Response and Security Measures
Mixpanel, founded in 2009 and based in San Francisco, detected what they described as a “smishing” campaign—phishing attacks conducted through SMS messages. After their initial investigation, they alerted OpenAI the next day.
The company took several security measures following the breach: they secured affected accounts, revoked active sessions, rotated compromised credentials, and blocked malicious IP addresses. They also reset employee passwords, hired external cybersecurity firms, and reviewed authentication and session logs.
Mixpanel CEO Jen Taylor stated that if customers haven’t heard from them directly, they weren’t impacted. But perhaps the damage to trust has already been done.
OpenAI Terminates Mixpanel Partnership
Despite Mixpanel’s prompt reporting of the incident, OpenAI decided to cut ties with the analytics firm entirely. “After reviewing this incident, OpenAI has terminated its use of Mixpanel,” the company wrote in their statement.
This decision reflects the high stakes involved when handling user data, especially for a company like OpenAI that’s under intense scrutiny. Some users took to social media to express frustration about their information being shared with third parties without their explicit knowledge.
One user wrote on X: “I’m not very happy about this. Why did they have to pass on my name and email address to Mixpanel? I’m just a hobbyist trying to make small experiments.” Another commented that “OpenAI sending names and emails to a third party analytics platform feels wildly irresponsible.”
The incident highlights the broader challenges companies face in balancing analytics needs with user privacy. While analytics services provide valuable insights into how people use products, they also represent additional security risks and potential points of failure.
As companies increasingly rely on third-party services, incidents like this serve as reminders that security is only as strong as the weakest link in the chain. For users, it’s another reason to be cautious about what information we share online, even with trusted platforms.







