{"id":52262,"date":"2023-06-08T14:07:28","date_gmt":"2023-06-08T14:07:28","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34703\/People-Are-Pirating-GPT-4-By-Scraping-Exposed-API-Keys.html"},"modified":"2023-06-08T14:07:28","modified_gmt":"2023-06-08T14:07:28","slug":"people-are-pirating-gpt-4-by-scraping-exposed-api-keys","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/","title":{"rendered":"People Are Pirating GPT-4 By Scraping Exposed API Keys"},"content":{"rendered":"<div readability=\"32\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/6480a78e72277e0b529a99c5\/lede\/1686153158459-openai.jpeg?crop=1xw:0.8422xh;0xw,0.1578xh&amp;resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/6480a78e72277e0b529a99c5\/lede\/1686153158459-openai.jpeg?crop=1xw:0.8422xh;0xw,0.1578xh&amp;resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/articles\/6480a78e72277e0b529a99c5\/lede\/1686153158459-openai.jpeg?crop=1xw:0.8422xh;0xw,0.1578xh&amp;resize=20:*\"><img class=\"responsive-image__img\" alt=\"OpenA\" decoding=\"async\" loading=\"eager\"><\/picture><\/div>\n<p>Image: Jack Guez\/Contributor<\/p>\n<\/div>\n<div data-component=\"BodyComponentRenderer\" readability=\"115.13481564875\">\n<div class=\"topic-callout\" readability=\"7.2888888888889\">\n<div class=\"topic-callout__img\"><a href=\"https:\/\/www.vice.com\/en\/topic\/cyber\"><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" alt=\"Screen Shot 2021-02-24 at 3\"><\/a><\/div>\n<p>Hacking. Disinformation. Surveillance. CYBER is Motherboard&#8217;s podcast and reporting on the dark underbelly of the internet.<\/p>\n<\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>People on the Discord for the r\/ChatGPT subreddit are advertising stolen OpenAI API tokens that have been scraped from other peoples\u2019 code, according to chat logs, screenshots and interviews. People using the stolen API keys can then implement GPT-4 while racking up usage charges to the stolen OpenAI account.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>In one case, someone has stolen access to a valuable OpenAI account with an upper limit of $150,000 worth of usage, and is now offering that access for free to other members, including via a website and a second dedicated Discord server. That server has more than 500 members.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34.058295964126\"><\/p>\n<p>People who want to use OpenAI&#8217;s large language models like GPT-4 need to make an account with the company and associate a credit card with the account. OpenAI then gives them a unique API key which allows them to access OpenAI&#8217;s tools. For example, an app developer can use code to implement ChatGPT or other language models in their app. The API key gives them access to those tools, and OpenAI charges a fee based on usage: \u201cRemember that your API key is a secret! Do not share it with others or expose it in any client-side code (browsers, apps),\u201d <a href=\"https:\/\/platform.openai.com\/docs\/api-reference\" target=\"_blank\" rel=\"noopener\"><span>OpenAI warns users<\/span><\/a>. If the key is stolen or exposed, anyone can start racking up charges on that person&#8217;s account.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"35\"><\/p>\n<p>The method by which the pirate gained access highlights a security consideration that paying users of OpenAI need to consider. The person says they scraped a website that allows people to collaborate on coding projects, according to screenshots. In many cases, it appears likely the authors of code hosted on the site, called Replit, did not realize they had included their OpenAI API keys in their publicly accessible code, exposing them to third-parties.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>\u201cMy acc [account] is still not banned after doing crazy shit like this,\u201d the pirate, who goes by the handle Discodtehe, wrote in the r\/ChatGPT Discord server Wednesday. <\/p>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--blockquote\" readability=\"10\">\n<p><em><strong>Do you know anything else about how people are maliciously using AI? We&#8217;d love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, or email&nbsp;joseph.cox@vice.com.<\/strong><\/em><\/p>\n<\/blockquote>\n<p><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>In the past few days, Discodtehe\u2019s use of at least one stolen OpenAI API key appears to have ramped up. They shared multiple screenshots of the account usage increasing over time. One recent screenshot shows usage this month of $1,039.37 out of $150,000.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>\u201cIf we have enough people they might not ban us all,\u201d Discodtehe wrote on Wednesday.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>Discodtehe appears to have been scraping exposed API keys for longer, though. In one Discord message from March, they wrote \u201cthe other day I scraped repl.it and found over 1000 working openai api keys.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>\u201cI didn\u2019t even do a full scrape, I only looked at about half of the results,\u201d they added.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"36\"><\/p>\n<p>Replit is an online tool for writing code collaboratively. Users can make projects, what Replit calls \u201cRepls,\u201d which are public by default, Cecilia Ziniti, Replit\u2019s general counsel and head of business development, told Motherboard in an email. Replit offers a mechanism for handling API keys called Secrets, Ziniti added.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>\u201cSome people accidentally do hard code tokens into their Repl&#8217;s code, rather than storing them in Secrets. Ultimately, users are responsible for safeguarding their own tokens and should not be storing them in public code,\u201d Ziniti said.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>Ziniti said the company scans projects for popular API key types, such as those from Github. After being alerted to this new API key issue by Motherboard, Ziniti said \u201cGoing forward, Replit will be reviewing our token scanning system to ensure that users are warned about accidentally exposing ChatGPT tokens.\u201d<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--pullquote\" readability=\"5\">\n<p>\u201cIf we have enough people they might not ban us all.\u201d<\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p>A ChatGPT community member told Motherboard that Discodtehe \u201cshould definitely stop.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>\u201cThis is a steadily growing industry and so of course there\u2019ll be crime in it sooner or later, but I\u2019m shocked at how quickly it\u2019s become an issue. The theft of corporate accounts is bad for sure, but I\u2019m personally more bothered about the way these guys are willing to rob regular people who posted their keys by mistake,\u201d they added. Motherboard granted the person anonymity so they didn\u2019t face retaliation from other community members.&nbsp;<\/p>\n<p><\/span><\/p>\n<div class=\"body-image\" data-component=\"ImageBlock\" readability=\"31\">\n<div class=\"body-image__img\">\n<div><picture class=\"responsive-image lazyloader--lazy lazyloader--lowres\"><source media=\"(min-width: 1000px)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1686153933183-freeaccess.jpeg?resize=20:*\"><source media=\"(min-width: 700px)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1686153933183-freeaccess.jpeg?resize=20:*\"><source media=\"(min-width: 0px)\" srcset=\"https:\/\/video-images.vice.com\/_uncategorized\/1686153933183-freeaccess.jpeg?resize=20:*\"><img class=\"responsive-image__img\" alt=\"free_access.jpg\" decoding=\"async\" loading=\"eager\"><\/picture><\/div>\n<\/div>\n<div class=\"body-image__caption\" readability=\"32\">\n<p>A screenshot of the site offering free GPT-4 access. Image: Motherboard.<\/p>\n<\/div>\n<\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>Discodtehe went a step further than just scraping tokens. Another Discord server, called ChimeraGPT, is offering \u201cfree access to GPT-4 and GPT-3.5-turbo!,\u201d according to chat logs viewed by Motherboard. Discodtehe said in another message that ChimeraGPT is using the same organization as the stolen API key discussed in the r\/ChatGPT Discord server. Motherboard found a Github repository that recommends using ChimeraGPT for getting a free API key. At the time of writing this server has 531 members.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>Discodtehe said in another message they also created a website where people can request free access to the OpenAI API. (Ironically, this site is also hosted on Replit; shortly before publication the site became inaccessible).<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>The site tells users to enter their email address, click on a link sent by OpenAI and accept the invite, set their default billing address to the organization \u201cweeeeee\u201d which Discodtehe appears to be using.<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>\u201cenjoy free gpt-4 api access,\u201d the website concludes. On Wednesday the organization linked to the OpenAI account had 27 members, according to one screenshot. By Thursday, that number had jumped to 40, according to another.<\/p>\n<p><\/span><\/p>\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--pullquote\" readability=\"5\">\n<p>\u201cMy acc [account] is still not banned after doing crazy shit like this.\u201d<\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>Discodtehe did not respond to a request for comment. A manager of the r\/ChatGPT Discord server called \u201cDawn\u201d told Motherboard their volunteer mods can not check every project, and \u201cwe are issuing a ban on the user.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>An OpenAI spokesperson told Motherboard in an email that \u201cWe conduct automated scans of big open repositories and we revoke any OpenAI keys discovered. We advise that users not reveal their API key after they are generated. If users think their API key may have been exposed, we urge them to rotate their key immediately.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>The community member, however, said \u201cI think OpenAI holds a little bit of culpability here for how their authentication process works too though.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>\u201cYou don\u2019t hear about API access to Google Cloud accounts getting stolen like this because Google has better auth[entication] procedures. I hope OpenAI\u2019s integration with Microsoft brings some better security for users going forward,\u201d they said.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>Discodtehe referred to the usage as \u201cjust borrowing\u201d in another message. They wrote that the usage is \u201cjust quote, no bills have been paid yet.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>\u201cIn the end, OpenAI will likely foot the bill,\u201d they said.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p>OpenAI did not immediately respond to a follow up question asking if it would foot the bill.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"20.049382716049\"><\/p>\n<p><em><strong>Subscribe to our cybersecurity podcast,&nbsp;<a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener\">CYBER<\/a>. Subscribe to&nbsp;<a href=\"https:\/\/m.twitch.tv\/vice\" target=\"_blank\" rel=\"noopener\">our Twitch channel<\/a>.<\/strong><\/em><\/p>\n<p><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34703\/People-Are-Pirating-GPT-4-By-Scraping-Exposed-API-Keys.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":52263,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[10550],"class_list":["post-52262","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackercybercrimedata-lossbotnetfraudpasswordpirate"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>People Are Pirating GPT-4 By Scraping Exposed API Keys 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"People Are Pirating GPT-4 By Scraping Exposed API Keys 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-08T14:07:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"People Are Pirating GPT-4 By Scraping Exposed API Keys\",\"datePublished\":\"2023-06-08T14:07:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\\\/\"},\"wordCount\":1183,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys.jpg\",\"keywords\":[\"headline,hacker,cybercrime,data loss,botnet,fraud,password,pirate\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\\\/\",\"name\":\"People Are Pirating GPT-4 By Scraping Exposed API Keys 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys.jpg\",\"datePublished\":\"2023-06-08T14:07:28+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys.jpg\",\"width\":240,\"height\":238},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,cybercrime,data loss,botnet,fraud,password,pirate\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackercybercrimedata-lossbotnetfraudpasswordpirate\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"People Are Pirating GPT-4 By Scraping Exposed API Keys\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"People Are Pirating GPT-4 By Scraping Exposed API Keys 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/","og_locale":"en_US","og_type":"article","og_title":"People Are Pirating GPT-4 By Scraping Exposed API Keys 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-08T14:07:28+00:00","og_image":[{"url":"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"People Are Pirating GPT-4 By Scraping Exposed API Keys","datePublished":"2023-06-08T14:07:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/"},"wordCount":1183,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys.jpg","keywords":["headline,hacker,cybercrime,data loss,botnet,fraud,password,pirate"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/","url":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/","name":"People Are Pirating GPT-4 By Scraping Exposed API Keys 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys.jpg","datePublished":"2023-06-08T14:07:28+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys.jpg","width":240,"height":238},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/people-are-pirating-gpt-4-by-scraping-exposed-api-keys\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,cybercrime,data loss,botnet,fraud,password,pirate","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackercybercrimedata-lossbotnetfraudpasswordpirate\/"},{"@type":"ListItem","position":3,"name":"People Are Pirating GPT-4 By Scraping Exposed API Keys"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52262"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52262\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/52263"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}