ai.type

What Happened

In December 2017, the virtual keyboard application ai.type was found to have left a huge amount of data publicly facing in an unsecured MongoDB instance. Discovered by researchers at The Kromtech Security Center, the 577GB data set included extensive personal information including over 20 million unique email addresses, social media profiles and address book contacts. The email addresses alone were provided to HIBP to enable impacted users to assess their exposure.

Compromised Data

Address book contacts
Apps installed on devices
Cellular network names
Dates of birth
Device information
Email addresses
Genders
Geographic locations
IMEI numbers
IMSI numbers
IP addresses
Names
Phone numbers
Profile photos
Social media profiles

Recommended Actions

Monitor for Suspicious Activity

Watch for unusual login attempts, spam and phishing emails.

1Password

Use 1Password to generate and store strong, unique passwords for all your accounts.

Try 1Password

Breach Overview

  • Affected Accounts:

    20.6 million
  • Breach Occurred:

    December 2017
  • Added to HIBP:

    8 Dec 2017

Recommended Actions

Change Your Password

If you haven't changed your ai.type password since 2017, do so immediately.

Enable Two-Factor Authentication

Add an extra layer of security to your account.

Check Other Accounts

If you used the same password elsewhere, change those too.

Monitor for Suspicious Activity

Watch for unusual login attempts or messages from your account.

1Password

Use 1Password to generate and store strong, unique passwords for all your accounts.

Try 1Password