gptAnon
AI Privacy Blog

OmniGPT Breach: Hacker Claims API Keys, Phone Numbers, and Emails of 30,000 Users

April 14, 2026 · 2 min read

A hacker claims to have breached OmniGPT and exfiltrated over 30,000 user emails, phone numbers, API keys, and sensitive settings. The incident underscores how third-party AI aggregators are becoming the weakest link in the AI supply chain.

What Happened

A threat actor claims to have breached OmniGPT, an AI aggregator that lets users query multiple frontier models through one interface. The dump allegedly contains over 30,000 user email addresses, phone numbers, API keys, and other sensitive account metadata.

API keys are the part that should make every AI builder sit up. An exposed key can be replayed against the paying customer's frontier-model account — burning credits, exfiltrating conversations, or generating abuse content billed to the victim.

Why Aggregators Are A Risk Surface

Aggregator products are convenient — one subscription, many models — but they sit between the user and the model provider. That means:

  • They store credentials for multiple AI services
  • They route prompts through their own infrastructure
  • They often retain prompt and response logs for features like history or analytics
  • They become a single juicy target

The user pays once for convenience and pays again, involuntarily, in attack surface.

Contagion Risk

If confirmed, the OmniGPT dump could fuel a wave of follow-on abuse: credential stuffing against model providers, SIM-swap targeting from the exposed phone numbers, and social engineering of business accounts where the user reused credentials.

This is a familiar breach pattern with a new twist — AI keys are high-value, programmatic credentials. They are not like passwords you can rotate casually; they are often tied to production systems and automated pipelines.

If You Used OmniGPT

  • Rotate every API key you stored with them, starting with OpenAI, Anthropic, Google, and Cohere.
  • Review usage logs at each provider for unexpected traffic.
  • Consider your phone number burned for 2FA resets; move to an app-based authenticator.
  • Change passwords anywhere you reused them.
  • The Bigger Lesson

    Every layer between you and the model is a layer that can be breached. The most private AI product is the one that does not store your identity to begin with — which is why, at GPTAnon, we simply do not. Convenience is tempting, but the OmniGPT breach is the latest reminder that convenience has a price tag.

    Read without being tracked

    GPTAnon lets you chat with AI models — ChatGPT, Claude, Gemini, and more — without creating accounts or having your conversations logged.

    Start chatting anonymously →