Muah.AI Data Breach
Muah.AI 'AI Girlfriend' Chatbot Breach (2024): 1.9 Million User Records Including AI Prompt Content & Sexual Preferences Exposed
AI chatbot and conversational platform.
Risk Interpretation
Extremely sensitive. Exposure can reveal intimate fantasies, fetish interests, and potentially illegal or highly stigmatizing prompt content. This creates acute risk of extortion, reputational harm, coercion, and law-enforcement or employer exposure concerns.
Impact & Downstream Threats
The institutional impact on Muah.AI is significant on reputational and regulatory dimensions, although the platform continues to operate. Law enforcement attention has been raised in multiple jurisdictions because of the documented presence of child-exploitation prompts in the dataset, with potential implications for the platform's compliance with content-moderation, anti-CSAM, and AI-safety regulatory frameworks emerging in 2024 to 2026. The case has been cited as a leading example of safety fa
- Targeted phishing campaigns using exposed email addresses
Threat Vectors
Breach Intelligence
Executive Summary
Muah.AI, a self-described 'uncensored' AI girlfriend and companion chatbot platform, suffered a data breach on or around September 17, 2024 when a hacker exploited vulnerabilities in the site's infrastructure. The hacker reportedly described Muah.AI's technical foundation to 404 Media as a poorly assembled collection of open-source components and disclosed the breach to journalists after discovering the disturbing content of the user-prompt database. The breach was publicly disclosed in early October 2024 through 404 Media reporting and was indexed by Have I Been Pwned on October 8, 2024 with a sensitive flag.
The breach affected approximately 1.9 million users based on records indexed by Have I Been Pwned, which counted approximately 1,910,261 unique email addresses. Compromised fields included email addresses, AI prompts directing image generation, and user sexual-preference settings. The site's email-verification process meant that affected email addresses had been verified by their owners before the prompts were submitted, indicating that the prompts can credibly be tied to real individuals rather than to fraudulent use of someone else's email address. Many of the prompts were highly sexual in nature, and a significant portion of them described child sexual abuse scenarios, including documented requests for AI-generated content depicting infants and young children. The platform's email addresses are largely tied to real personal identities including names visible in LinkedIn profiles, rather than to anonymous burner accounts.
For affected users, the practical risk profile is exceptionally severe and varies substantially by the content of individual users' prompts. For users whose prompts were limited to lawful adult content, the standard adult-platform extortion-risk profile applies. Affected users who receive extortion attempts should not pay ransom demands because payment does not stop further extortion. Users should change any reused passwords on other accounts, enable two-factor authentication where available, document all extortion communications, and report extortion attempts to law enforcement. For users whose prompts described child sexual abuse scenarios, the risk profile extends substantially beyond extortion to include direct criminal exposure under U.S., U.K., and other jurisdictions' laws governing the production, possession, or attempted generation of child sexual abuse material, including computer-generated pseudo-images. Users with this exposure may be referred to legal counsel and should expect that law enforcement agencies have access to or are reviewing the breach data. A documented active extortion vector specifically targets high-value IT employees among affected users, demanding access to employer systems rather than financial payment, meaning employers may be at indirect risk through their staff's exposure in this breach.
About Muah.AI
Muah.AI is an 'AI girlfriend' companion-chatbot platform that allows users to create and interact with customized AI-powered companions for romantic, sexual, and conversational role-play. The platform offers text chat, voice chat, and AI-generated image exchange with user-customized AI characters described as 'caring AI-powered girlfriends, supportive boyfriends, or virtual therapists.' Muah.AI markets itself as 'uncensored' and explicitly positions itself in opposition to mainstream AI platforms' content moderation, stating publicly that it does not 'actively censor or filter AI' and that 'any topic can be discussed without running into a wall.' As an account-based generative-AI companion platform, Muah.AI maintains user account data including email addresses and stored prompt history that captures users' generative requests, sexual fantasies, fetish preferences, and persistent character-customization settings.
Why They Hold Your Data
AI companion and sexually oriented chatbot platforms collect account emails, generated prompt history, fetish-linked preferences, and interaction data tied to deeply personal or explicit use cases.
Recent Developments
The Muah.AI breach was first reported by 404 Media in early October 2024 after a hacker independently discovered and exploited vulnerabilities in the site's infrastructure. The hacker, who reportedly stumbled onto the vulnerabilities while using the site for adult content, told 404 Media that the platform was 'basically a handful of open-source projects duct-taped together' and that they decided to contact journalists after seeing what was in the database. Have I Been Pwned added the breach on October 8, 2024 with a sensitive-breach designation. Muah.AI's administrator publicly responded by claiming the hack must have been 'sponsored by competitors in the uncensored AI industry' rather than acknowledging the platform's security weaknesses. The breach has been the subject of significant legal and media analysis, including detailed coverage from Linklaters and other law firms regarding criminal exposure for users whose prompts described illegal content, and regarding active extortion attempts targeting affected individuals.
Data Points Exposed
Canonical Fields
ai_prompt_content, email_address, sexual_preferences
Dark Web Verification
- Dataset containing ~1.9M records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: Muah.AI Data Breach
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Muah.AI
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
