A hacker said they purloined private details from countless OpenAI accounts-but researchers are doubtful, and the business is investigating.
OpenAI states it's investigating after a hacker claimed to have swiped login qualifications for 20 million of the AI firm's user accounts-and put them up for sale on a dark web online forum.
The pseudonymous breacher published a puzzling message in Russian advertising "more than 20 million gain access to codes to OpenAI accounts," calling it "a goldmine" and offering possible buyers what they claimed was sample information containing email addresses and passwords. As reported by Gbhackers, nerdgaming.science the full dataset was being marketed "for just a few dollars."
"I have over 20 million gain access to codes for OpenAI accounts," emirking composed Thursday, smfsimple.com according to an equated screenshot. "If you're interested, reach out-this is a goldmine, and Jesus agrees."

If legitimate, lespoetesbizarres.free.fr this would be the third major security occurrence for the AI business because the release of ChatGPT to the public. In 2015, a hacker got access to the business's internal Slack messaging system. According to The New York Times, the hacker "took details about the style of the business's A.I. technologies."

Before that, in 2023 an even simpler bug involving jailbreaking triggers enabled hackers to obtain the personal information of OpenAI's paying clients.
This time, however, security researchers aren't even sure a hack happened. Daily Dot reporter Mikael Thalan composed on X that he found invalid email addresses in the expected sample information: "No evidence (suggests) this alleged OpenAI breach is legitimate. At least 2 addresses were invalid. The user's just other post on the online forum is for a thief log. Thread has actually considering that been erased too."
No evidence this supposed OpenAI breach is genuine.
Contacted every email address from the supposed sample of login qualifications.
At least 2 addresses were void. The user's just other post on the forum is for a stealer log. Thread has given that been erased too. https://t.co/yKpmxKQhsP
- Mikael Thalen (@MikaelThalen) February 6, 2025

OpenAI takes it 'seriously'
In a declaration shared with Decrypt, an OpenAI spokesperson acknowledged the circumstance while maintaining that the company's systems appeared safe and larsaluarna.se secure.
"We take these claims seriously," the representative said, including: "We have not seen any evidence that this is connected to a compromise of OpenAI systems to date."
The scope of the supposed breach triggered concerns due to OpenAI's enormous user base. Countless users worldwide count on the company's tools like ChatGPT for sitiosecuador.com service operations, instructional functions, and content generation. A legitimate breach might expose private discussions, industrial projects, and other delicate information.
Until there's a final report, some preventive steps are constantly recommended:
- Go to the "Configurations" tab, log out from all connected devices, and enable two-factor authentication or 2FA. This makes it virtually difficult for a hacker to gain access to the account, even if the login and passwords are jeopardized.
- If your bank supports it, then develop a virtual card number to manage OpenAI subscriptions. In this manner, it is much easier to spot and prevent fraud.
- Always watch on the conversations stored in the chatbot's memory, and know any phishing efforts. OpenAI does not ask for mediawiki.hcah.in any individual details, and any payment upgrade is constantly dealt with through the main OpenAI.com link.