HIGH SEVERITYChat

Muah.AI Data Breach

Muah.AI 'AI Girlfriend' Chatbot Breach (2024): 1.9 Million User Records Including AI Prompt Content & Sexual Preferences Exposed

AI chatbot and conversational platform.

Verified by ObscureIQ Intelligence

6.0Severity
1.9MRecords
3Fields
2024Year

ObscureIQ Breach Intelligence Scores
13.2
Breach Risk Index
40
Data Value
25
Market Recency
566
days
Since Breach

Risk Interpretation

Extremely sensitive. Exposure can reveal intimate fantasies, fetish interests, and potentially illegal or highly stigmatizing prompt content. This creates acute risk of extortion, reputational harm, coercion, and law-enforcement or employer exposure concerns.

🎯 Impact & Downstream Threats

The institutional impact on Muah.AI is significant on reputational and regulatory dimensions, although the platform continues to operate. Law enforcement attention has been raised in multiple jurisdictions because of the documented presence of child-exploitation prompts in the dataset, with potential implications for the platform's compliance with content-moderation, anti-CSAM, and AI-safety regulatory frameworks emerging in 2024 to 2026. The case has been cited as a leading example of safety fa

Primary downstream threats:
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Sensitive disclosure & behavioural profiling
Phishing, credential stuffing & account takeover
Blackmail & coercive extortion

📋 Breach Intelligence

EntityMuah.AI
OrganizationPrivate Company • USA / Global
Breach Date2024-09-01
HIBP Added2024-10-08
Records~1.9M (1,900,000 records)
Attack VectorMisconfiguration
Threat ActorAnonymous hacker (404 Media source)
Data SubjectsUser
Breach PathwayDirect
SourceHave I Been Pwned / ObscureIQ
SensitivityRestricted
Breach ID925.0
StatusConfirmed

📝 Executive Summary

Muah.AI, a self-described 'uncensored' AI girlfriend and companion chatbot platform, suffered a data breach on or around September 17, 2024 when a hacker exploited vulnerabilities in the site's infrastructure. The hacker reportedly described Muah.AI's technical foundation to 404 Media as a poorly assembled collection of open-source components and disclosed the breach to journalists after discovering the disturbing content of the user-prompt database. The breach was publicly disclosed in early October 2024 through 404 Media reporting and was indexed by Have I Been Pwned on October 8, 2024 with a sensitive flag.

The breach affected approximately 1.9 million users based on records indexed by Have I Been Pwned, which counted approximately 1,910,261 unique email addresses. Compromised fields included email addresses, AI prompts directing image generation, and user sexual-preference settings. The site's email-verification process meant that affected email addresses had been verified by their owners before the prompts were submitted, indicating that the prompts can credibly be tied to real individuals rather than to fraudulent use of someone else's email address. Many of the prompts were highly sexual in nature, and a significant portion of them described child sexual abuse scenarios, including documented requests for AI-generated content depicting infants and young children. The platform's email addresses are largely tied to real personal identities including names visible in LinkedIn profiles, rather than to anonymous burner accounts.

For affected users, the practical risk profile is exceptionally severe and varies substantially by the content of individual users' prompts. For users whose prompts were limited to lawful adult content, the standard adult-platform extortion-risk profile applies. Affected users who receive extortion attempts should not pay ransom demands because payment does not stop further extortion. Users should change any reused passwords on other accounts, enable two-factor authentication where available, document all extortion communications, and report extortion attempts to law enforcement. For users whose prompts described child sexual abuse scenarios, the risk profile extends substantially beyond extortion to include direct criminal exposure under U.S., U.K., and other jurisdictions' laws governing the production, possession, or attempted generation of child sexual abuse material, including computer-generated pseudo-images. Users with this exposure may be referred to legal counsel and should expect that law enforcement agencies have access to or are reviewing the breach data. A documented active extortion vector specifically targets high-value IT employees among affected users, demanding access to employer systems rather than financial payment, meaning employers may be at indirect risk through their staff's exposure in this breach.

🏢 About Muah.AI

Muah.AI is an 'AI girlfriend' companion-chatbot platform that allows users to create and interact with customized AI-powered companions for romantic, sexual, and conversational role-play. The platform offers text chat, voice chat, and AI-generated image exchange with user-customized AI characters described as 'caring AI-powered girlfriends, supportive boyfriends, or virtual therapists.' Muah.AI markets itself as 'uncensored' and explicitly positions itself in opposition to mainstream AI platforms' content moderation, stating publicly that it does not 'actively censor or filter AI' and that 'any topic can be discussed without running into a wall.' As an account-based generative-AI companion platform, Muah.AI maintains user account data including email addresses and stored prompt history that captures users' generative requests, sexual fantasies, fetish preferences, and persistent character-customization settings.

Platform | AI-driven companion and chat services | Consumer AI platform | Global
Private CompanyUSA / Globalmuah.ai

🗂 Why They Hold Your Data

AI companion and sexually oriented chatbot platforms collect account emails, generated prompt history, fetish-linked preferences, and interaction data tied to deeply personal or explicit use cases.

📰 Recent Developments

The Muah.AI breach was first reported by 404 Media in early October 2024 after a hacker independently discovered and exploited vulnerabilities in the site's infrastructure. The hacker, who reportedly stumbled onto the vulnerabilities while using the site for adult content, told 404 Media that the platform was 'basically a handful of open-source projects duct-taped together' and that they decided to contact journalists after seeing what was in the database. Have I Been Pwned added the breach on October 8, 2024 with a sensitive-breach designation. Muah.AI's administrator publicly responded by claiming the hack must have been 'sponsored by competitors in the uncensored AI industry' rather than acknowledging the platform's security weaknesses. The breach has been the subject of significant legal and media analysis, including detailed coverage from Linklaters and other law firms regarding criminal exposure for users whose prompts described illegal content, and regarding active extortion attempts targeting affected individuals.

🔍 Data Points Exposed

3 verified field types:
AI prompts
Email
Sexual fetishes

Canonical Fields

ai_prompt_content, email_address, sexual_preferences

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~1.9M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: Muah.AI Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Muah.AI
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationEmail

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom