top of page

Attackers Love Analytics Too—Just Not the Way You’d Hope

  • Writer: FAIR INTEL
    FAIR INTEL
  • Dec 8, 2025
  • 16 min read

December 8, 2025

Synopsis

The analysis indicates that a financially motivated or data-theft–oriented actor used smishing against Mixpanel employees to compromise internal accounts and exfiltrate limited OpenAI-related user profile data, creating a supply-chain–driven identity and targeting risk rather than a direct breach of OpenAI systems. Strategically, this elevates third-party analytics and SaaS providers to material risk drivers that boards and executives must govern explicitly (through vendor due diligence, contract terms, logging/telemetry requirements, and downstream customer notifications). At the same time, operationally, it demands a stronger identity and SaaS monitoring, smishing-aware awareness training, and well-rehearsed incident response, CTI, and DFIR processes tuned to account takeovers and cloud data exports rather than malware-based compromise. Tactically, security teams need concrete detection and hunting content around anomalous authentication, session use, and exports, along with updated playbooks for revoking sessions, rotating credentials, tightening export permissions, and using DFIR metrics (affected users, exposed attributes, duration of access, likelihood of follow-on phishing) to refine FAIR inputs. The FAIR-informed view suggests moderate threat event frequency and susceptibility (for example, LEF on the order of 0.8 events per year and non-trivial vulnerability driven by human behavior), meaning the organization’s risk posture is meaningfully impacted but tractable if controls and governance are improved. Financial resilience planning should assume relatively modest but recurring primary losses (incident response, customer notification, hardening, and downtime) with the potential for higher but less frequent secondary losses (fraud, deeper system misuse, regulatory scrutiny, or customer churn), and should ensure reserves, cyber insurance strategies, and third-party risk programs are calibrated to this pattern of identity- and analytics-driven exposure.


Evaluated Source, Context, and Claim

Artifact Title

OpenAI data may have been exposed after a cyberattack on analytics firm Mixpanel

Our response to a recent security incident


Source Type

Independent cybersecurity news article (Security Affairs) and official vendor incident-response blog post (Mixpanel corporate blog).


Publication Date: November 27, 2025


Credibility Assessment

Security Affairs is a long-running, specialist cyber-news outlet that typically quotes primary disclosures, while the Mixpanel blog is a primary source from the impacted vendor. Taken together, they give a credible, mutually reinforcing account of a limited but real incident, though they should be balanced with other independent reporting for high-impact decisions.


General Claim

A smishing-enabled cyberattack against analytics provider Mixpanel led to unauthorized access and export of limited analytics datasets, including OpenAI platform user profiles and device/usage details, but not ChatGPT content or credentials, creating downstream phishing and social-engineering risk for affected customers while prompting OpenAI to sever Mixpanel integrations and Mixpanel to execute a full incident-response and hardening program.

 

Narrative Reconstruction

An unknown external threat actor, plausibly a financially motivated or data-theft–oriented group, conducted an SMS-based phishing (smishing) campaign against Mixpanel employees, successfully obtaining access to some internal accounts and using them to export selected analytics datasets from Mixpanel’s environment, including a limited set of OpenAI platform user profile information such as names, emails, approximate location, device/OS/browser details, organization or user IDs, and referrer data, but not passwords, payment data, or ChatGPT/API content. This activity followed a kill-chain–like flow of social engineering, credential/session compromise, authenticated access, and targeted data export, prompting Mixpanel to contain and eradicate unauthorized access (revoking sessions, rotating credentials, blocking malicious IPs, registering IOCs, resetting employee passwords, and engaging third-party forensics and law enforcement) while implementing new controls to detect similar campaigns. OpenAI, as a downstream customer, treated the incident as a material supply-chain exposure rather than a direct breach, removed Mixpanel from production, reviewed affected datasets, and began notifying impacted organizations and users, warning that the exposed profile data could be weaponized for more convincing phishing and social-engineering attempts targeting OpenAI platform administrators and developers. In aggregate, the attacker's operational goal appears to be the acquisition of linked identity and behavioral analytics for reuse in targeted attacks. At the same time, the primary assets at risk are customer analytics and associated user identities across organizations that rely on Mixpanel for product analytics.


Risk Scenario

Risk Scenario

An external attacker obtains user-identifying data from a compromised third-party analytics provider and then uses that information to craft convincing phishing or social-engineering messages targeting customers of the affected service. Some recipients are tricked into revealing credentials or approving unauthorized access, allowing the attacker to enter customer environments, potentially view or copy sensitive information, alter configurations, or cause service disruption. This results in financial loss through response costs, business interruption, and reputational harm for the impacted organizations.


Threat

An opportunistic external cyber threat actor (likely financially motivated or data-broker–style) with demonstrated ability to run smishing campaigns against SaaS vendors and to exfiltrate curated analytics datasets that include identifiable user and organizational information.


Method

Using the stolen Mixpanel dataset tied to OpenAI (names, emails, rough geolocation, device/OS/browser details, organization or user IDs, and referrer info) to design tailored phishing and social-engineering campaigns (email, SMS, or in-app lookalikes) against OpenAI platform users and admins, with the aim of harvesting credentials, bypassing MFA (for example via fatigue or push-approval tricks), and establishing unauthorized sessions in customer environments.


Asset

OpenAI customers’ administrative and developer accounts and their associated tenant environments (including any connected data stores, APIs, and downstream applications that depend on those credentials), along with the trust users place in OpenAI-related communications and security notifications.


Impact

If the scenario materializes, affected customers could experience confidentiality losses (exfiltration of proprietary or sensitive data), integrity losses (unauthorized changes to configurations, models, or code), and availability impacts (service disruption or account lockouts), with financial consequences that include investigation and incident-response costs, potential contractual penalties or regulatory scrutiny, customer churn, and reputational damage stemming from a perceived failure to manage third-party analytics risk even though the initial compromise occurred at Mixpanel.

 

Evidentiary Basis for Synopsis and Recommendations

Supporting observations from the analysis help clarify how the threat landscape, control environment, and organizational behaviors interact to shape overall risk exposure. These insights provide the foundation for identifying where controls perform well, where gaps or weaknesses create unnecessary vulnerability, and how attacker methods intersect with real-world operational conditions. Building on these findings, the recommendations that follow focus on strengthening resilience, improving decision-making, and guiding readers toward practical steps that enhance both security posture and risk-informed governance.


FAIR Breakdown

Threat Event Frequency (TEF)

Because OSINT describes a specific third-party compromise followed by possible downstream targeting, rather than a quantitative mass activity, TEF must be inferred from the nature of smishing campaigns and the breadth of affected analytics data. TEF is estimated as moderate because the attacker has data useful for targeted phishing, but the number of impacted customers is limited.


Contact Frequency (CF)

The attacker acquired user profile information for a subset of customers, enabling moderately frequent but targeted outreach rather than large-scale scanning. CF is therefore estimated as moderate: attackers can repeatedly contact known individuals via email or SMS with convincing lures, but only within the stolen dataset.


Probably of Action (PoA)

Motivation is likely high because phishing and credential theft often offer direct financial or access-based payoff, and the attack already included a successful initial compromise. Campaign aggressiveness is assumed to be moderate-to-high due to the willingness to compromise a vendor and the utility of exported user data for follow-on phishing. Thus, PoA is assessed as high.


Threat Capability (TCap)

TCap is moderate-to-high because the attacker successfully performed smishing, bypassed human defenses, accessed internal accounts, and exfiltrated analytics datasets.


Exploit sophistication: Moderate. The attack relied on social engineering and credential misuse rather than technical vulnerabilities.


Bypass ability: The actor accessed internal accounts despite controls such as account monitoring.


Tooling maturity: Moderate. The OSINT does not indicate the presence of sophisticated malware but shows operational maturity in credential exploitation and data exfiltration.


Campaign success rate: Moderate. They achieved unauthorized access, but the number of impacted accounts appears limited.


Attack path sophistication: Moderate-to-high; social engineering, to account compromise, to data exfiltration.


Cost to run attack: Low to moderate; smishing operations require limited infrastructure once phone numbers or targets are acquired.


Control Strength (CS)

Typical organizational environments have mixed controls around third-party analytics integrations, while the OSINT shows that the compromise succeeded through social engineering of employee accounts.


Resistive Strength (RS)Effectiveness of preventive/detective controls:

Overall RS: Low-to-moderate.

  • Mixpanel successfully detected the campaign but only after unauthorized access occurred, indicating moderate RS.

  • Internal response measures (session revocation, credential rotation, forensic review, global password resets) indicate reasonable maturity but did not prevent initial compromise.


Control Failure Rate

  • The compromise of internal accounts through smishing suggests that human-layer controls were insufficient.

  • The incident required broad resets and containment actions, indicating a moderate-to-high control failure rate.


Susceptibility

Given moderate-to-high threat capability and moderate control strength, susceptibility is estimated at 45–65 percent, reflecting a meaningful likelihood that customers who receive targeted phishing messages derived from exposed data may suffer account compromise.

Probability that the asset will be harmed is influenced by:


Exploitability: 60–75 percent. The attack vector is social engineering, which often succeeds when user profiles and context are known.

Attack surface: 30–50 percent. Only users included in the stolen dataset are at risk; OSINT suggests a “limited number of customers.”

Exposure conditions: 40–60 percent due to increased effectiveness of phishing when attackers have precise identity and device metadata.

Patch status: 0–10 percent relevance, as the attack bypasses software vulnerabilities and relies on behavioral exploitation.


Numerical Frequencies and Magnitudes

All values relating to actual dollar amounts are for example/speculative purposes only. Organizations would need to take into account their own asset values, control strength, telemetry, etc., and adjust numbers accordingly.


Loss Event Frequency (LEF)

.8/year (estimated)

  • Justification: Targeted phishing enabled by exposed analytics data tends to be limited in scale due to the small number of affected customers but remains persistent as long as attackers retain the dataset.

Vulnerability (probability of harm per contact): .4

  • Justification: The attack path depends entirely on user interaction and trust in seemingly legitimate messages; success is meaningful but not universal, especially given limited recipient populations.


Secondary Loss Event Frequency

0.6/year (estimated)

  • Justification: Not all primary compromises lead to secondary system misuse or operational impact, but credential theft and impersonation opportunities increase the moderately high probability of follow-on events (assumed at ~50 percent of primary compromises).


Loss Magnitude

Estimated range:

  • Min: $5,000

  • Most Likely: $25,000

  • Maximum: $150,000

Justification:

  • Minimum reflects account cleanup and security review.

  • Most likely covers incident response, user notification, security hardening, and operational downtime.

  • Maximum reflects deeper unauthorized access or exposure of sensitive business information.


Secondary Loss Magnitude (SLM)

Estimated range:

  • Min: $10,000

  • Most Likely: $75,000

  • Maximum: $300,000

Justification:

  • Secondary losses arise from misuse of compromised credentials, potential access to connected systems, legal or regulatory support, and reputational impact.


Mapping, Controls, and Modeling


MITRE ATT&CK Mapping

Initial Access

T1566.002 – Phishing: Spearphishing Link

Reference: “Mixpanel detected a smishing campaign… We took comprehensive steps to contain and eradicate unauthorized access…”

Reference: “The analytics provider reported a smishing attack detected on November 8…”

Defensive Evasion

T1070 – Indicator Removal / Session Manipulation

Reference: “Revoked all active sessions and sign-ins… rotated compromised credentials”(While this text describes Mixpanel’s response, it confirms that the attacker’s unauthorized access involved active sessions that had to be revoked—indicating session hijack/misuse, which falls under evasion by abusing valid sessions.)

Credential Access

T1556 – Modify Authentication Mechanisms / Abuse of Valid Accounts

Reference: “Unauthorized access… secure impacted user accounts… rotated compromised Mixpanel credentials”

Reference: “Compromised accounts… all active sessions revoked”(Indicates attacker success via credential compromise, but does not describe how credentials were stolen beyond smishing.)

Collection

T1530 – Data from Cloud Storage / SaaS Platforms

Reference: “The attacker… stole a limited Mixpanel dataset containing user profile details… name, email, rough location, OS/browser info, organization or user ID, and referring website.”

Exfiltration

T1537 – Transfer Data to Cloud Account

Reference: “The attacker instead stole a limited Mixpanel dataset…”(This reflects unauthorized export of cloud-stored analytics data.)

Impact(No destructive, disruptive, or data-manipulation effects described. No mapping added.)


NIST 800-53 Affected Controls

AT-2(3) — Literacy Training and Awareness | Social Engineering and Mining

Reference: “Mixpanel detected a smishing campaign…”The attack succeeded because employees were deceived via smishing, directly undermining user awareness training intended to recognize and resist social-engineering attempts.

IA-5 — Authenticator Management

Reference: “Rotated compromised Mixpanel credentials for impacted accounts.”The compromise of valid credentials indicates an attacker's success against poor resistance or improper handling of authentication secrets, triggering emergency remediation.

IA-11 — Re-authentication

Reference: “Revoked all active sessions and sign-ins…”This control is implicated because attackers maintained unauthorized sessions that required forced revocation; this indicates a failure to ensure continuous session legitimacy.

AC-2 — Account Management

Reference: “Secured affected accounts… revoked all active sessions… rotated credentials.”Unauthorized account access demonstrates a failure or bypass of account-management safeguards designed to ensure accounts are used only by authorized users.

AC-7 — Unsuccessful Logon Attempts

Reference: The smishing-based compromise bypassed logon failure detection entirely by obtaining valid credentials, rendering this control ineffective in detecting malicious use.

AU-6 — Audit Review, Analysis, and Reporting

Reference: “Performed a forensic review of authentication, session, and export logs…”The control is invoked because attacker activity required retroactive log analysis, indicating that logs did not provide timely alerting that could have prevented or contained the breach earlier.

SI-4 — System Monitoring

Reference: “Registered IOCs in our SIEM platform… blocked malicious IP addresses.”The need to add IOCs and block malicious IPs after detection shows that the monitoring failed to identify the compromise before the data export occurred.

IR-4 — Incident Handling

Reference: “We took comprehensive steps to contain and eradicate unauthorized access…”The organization had to activate its incident-response plan due to a control failure allowing unauthorized access.

IR-6 — Incident Reporting

Reference: “We proactively communicated with all impacted customers.”Incident reporting was required because the initial compromise bypassed preventive controls.

SC-7 — Boundary Protection

Reference: “Blocked the malicious IP addresses involved in the attack.”Attackers leveraged external communication channels to compromise accounts, showing that boundary protections did not prevent credential misuse.

SC-23 — Session Authenticity

Reference: “Revoked all active sessions and sign-ins…”Unauthorized use of valid sessions indicates a breakdown in session-authenticity protections.


Monitoring, Hunting, Response, and Reversing

Monitoring

Monitoring should prioritize telemetry from identity, cloud/SaaS, email, and network sources, with DNS and endpoint used to enrich but not drive detection, focusing on smishing-related access anomalies and cloud-data export behaviors. Identity and SaaS logs should include detailed authentication, session, and export events from Mixpanel-like platforms (user, device, geo, method, app, API call, export volume), with log levels increased so that all successful logons, session creations, and data-export operations are captured and retained for long enough to support forensic review. Key indicators include sign-ins from unusual locations or devices, sudden spikes in export jobs or API-based downloads, new or rarely used admin accounts performing exports, high-volume or unusual queries against user-profile tables, and repeated failed logins preceding a successful session from new IP ranges. Gaps exposed by this incident include weak visibility into employee-targeted smishing (SMS channel) and incomplete coverage of third-party analytics platforms’ export and session events, so monitoring should explicitly onboard vendor SaaS telemetry and enrich with mobile/MDM logs where possible. Correlation should link identity events (new or unusual logins) to subsequent access and export patterns (large export jobs, new API tokens, changed access roles), with thresholds tuned to alert on deviations from per-account baselines rather than on fixed volumes. Dashboards should surface “Top data exports by user and volume,” “Unusual session geolocation,” and “High-risk third-party SaaS access” metrics, and monitoring should be validated by replaying simulated smishing-success scenarios, including test accounts performing anomalous exports, to confirm that alerts, dashboards, and playbooks trigger as expected without overwhelming analysts.


Hunting

Hunting should start from the hypothesis that a small number of employee or admin accounts have been compromised through smishing and are being used to exfiltrate analytics datasets or prepare downstream phishing campaigns, and a secondary hypothesis that attackers may test access with low-volume exports before scaling up. Telemetry should focus on identity and SaaS logs (authentication, sessions, exports, API usage), email/mobile security systems (SMS phishing or suspicious links, if available), and network/DNS data indicating access to unusual management endpoints or export URLs. Detection logic for hunts can include identifying accounts with unusual sign-in patterns (new geos, ISPs, device fingerprints), rare or first-time use of export functions, exports outside regular business hours, or access sequences in which a single account touches many customer environments or large user cohorts within a short window. Noise-to-signal considerations require distinguishing legitimate product analytics exports and admin maintenance from malicious use, so hunts should use peer-group baselining (per admin, per team) and require multiple weak signals (e.g., geo anomaly plus first-time export plus new IP) before escalating; hunts should remain hypothesis-driven rather than broad signature sweeps to keep results interpretable and actionable.


Response

Response should assume that identity and SaaS logs (authentication, session, export, role changes, API token creation, IP, and user agent) are the primary evidence sources, with supporting artifacts including SMS or email phishing messages, screenshots or URLs used in smishing, and any exported file manifests. Expected artifacts include sequences of logon events followed by export operations targeting user-profile data, session tokens associated with suspicious IPs, and notifications or audit entries indicating account or credential changes. At the same time, anti-forensic behavior is more likely to appear as low-and-slow exports or use of legitimate admin workflows rather than log tampering, which the OSINT does not describe. Event reconstruction should follow a timeline from first suspicious login to last export or account-change event, mapping which employee accounts were used, what datasets were exported, and which downstream customers were affected, and DFIR outputs (number of affected users, data elements exposed, duration of unauthorized access, likelihood of downstream phishing) should feed FAIR loss estimates for both primary and secondary loss magnitude. Likely containment includes revoking all active sessions, rotating credentials, forcing MFA re-enrollment, tightening export permissions, and temporarily disabling high-risk accounts or integrations. At the same time, triage completes, with priority artifacts being export logs, access logs for impacted datasets, and notifications sent to customers. Telemetry requirements include complete, time-synchronized logs from identity providers, SaaS platforms, and security tools, while IR gaps to address include weak SMS visibility, incomplete logging for exports, and lack of predefined playbooks for third-party analytics compromise; DFIR validation should simulate account-takeover scenarios and confirm that logs and controls now allow rapid detection, scoping, and containment of similar events.


Reverse Engineering

Reverse-engineering recommendations in this scenario focus less on binary malware and more on dissecting the smishing and cloud-abuse components: teams should capture and analyze smishing messages, URLs, and any web flows or portals used to harvest credentials or drive users into unsafe actions, treating those flows as “loaders” for account compromise rather than software payloads. Evasion analysis should examine how messages bypass mobile or email filters, how attackers spoof brands or internal senders, and whether they exploit weaknesses in MFA UX (for example, consent fatigue or misleading prompts). In contrast, persistence analysis should focus on how attackers maintain access via long-lived sessions, API tokens, or added secondary factors rather than classic host-based persistence. Indicators should include sender numbers or domains, URLs, landing-page characteristics, hosting providers, IP infrastructure, and characteristic user-agent strings or referrer patterns seen during credential harvesting or export operations, and dynamic/static hooks should be placed around authentication flows, token issuance, and export endpoints in staging environments to observe attacker-like behavior safely. Expected artifacts for analysis include HTML and JavaScript from phishing pages, server-side logs from fake login portals if obtainable, and SaaS platform telemetry showing how compromised accounts are used; broader reverse-engineering efforts can include emulating attacker workflows in a lab tenant, characterizing abuse patterns against APIs and exports, and building reusable detection rules from these patterns without assuming the presence of traditional malware.


CTI

From a CTI perspective, PIRs should focus on whether this actor or copycats are targeting our sector, geography, or critical SaaS providers; the recurrence rate of similar smishing and cloud-data exfiltration campaigns; the consistently observed TTPs such as smishing for initial access, account takeover, export abuse, and downstream phishing; and which assets—employee identities, SaaS admin accounts, analytics datasets, or customer-profile tables—are repeatedly targeted. SIR activities should identify missing IOCs, including sending phone numbers, phishing URLs, landing-page fingerprints, IP ranges used for access and export, and hashes tied to phishing kits, while clarifying infrastructure relationships and attribution gaps and defining telemetry requirements to validate activity, ensuring identity, SaaS, and mobile/email logs contain enough detail to correlate IOCs. Collection efforts should maintain continuous OSINT monitoring of vendor advisories, independent reporting, forums, sandboxes, and industry sources, enriched with internal identity, SaaS, and IR telemetry, and supported by ISAC/ISAO collaboration, dark-web monitoring, and malware repositories to surface additional indicators. Mapping should cluster infrastructure, campaigns, and threat actors, align behaviors to ATT&CK, compare current incidents with historical smishing and SaaS-account-compromise cases, and identify emerging targeting patterns. At the same time, CTI continuously updates confidence levels and uses DFIR, telemetry, and external intelligence to validate or revise hypotheses, ultimately feeding refined TTP and IOC sets back into monitoring, hunting, and FAIR risk modeling.


GRC and Testing

Governance

Governance should drive explicit policy updates for third-party SaaS and analytics integrations, ensuring supplier risk, identity protection, and data-export controls are clearly addressed in acceptable use, access management, and vendor management policies, with particular emphasis on smishing and other out-of-band social-engineering threats to staff who administer or interact with critical SaaS platforms. Oversight functions (risk committee, IT governance board, vendor management office) should be tasked with reviewing how third-party analytics tools are selected, onboarded, monitored, and offboarded, and should require that RA, PM, and PL family governance documents (enterprise risk management plan, system security plans, third-party risk procedures, incident response and communications plans) explicitly cover SaaS provider compromise, downstream data exposure, and notification expectations. The corporate risk register should add or update entries for “third-party analytics compromise leading to targeted phishing,” with clear owners, current control posture, and FAIR-informed frequency and magnitude estimates derived from the scenario. Board and executive communications should summarize the incident pattern in plain language (smishing of vendor staff, export of profile data, downstream phishing risk), clarify whether similar integrations exist in the organization and how they are governed, highlight residual risk and planned mitigations, and set expectations for reporting on control improvements, tabletop outcomes, and quantitative risk changes over time.


Audit and Offensive Security Testing

Audit and offensive security testing should treat this scenario as evidence that social engineering of staff and weakly governed SaaS analytics exports are key control failures, and should review past audit findings related to identity management, SaaS governance, and third-party due diligence for gaps in coverage. Auditors should validate that required logs (authentication, sessions, exports, admin activity) are actually collected, retained, and reviewed for high-value SaaS tools, and document evidence gaps where export or session data is unavailable or not correlated, as these represent concrete vulnerabilities. Red and purple team exercises should include smishing-style campaigns against high-value staff (with appropriate consent and legal review), chained to simulated SaaS admin account takeover and data export, to validate that policies, MFA, and monitoring really prevent or detect the attack path described in the OSINT. Penetration test scopes should explicitly include third-party integrations and admin consoles, attempting to reproduce exploits via phishing, token abuse, and export misuse rather than only technical vulnerabilities. At the same time, control validation should confirm that session revocation, credential rotation, export permissions, and alerting all work as designed under simulated compromise. Compliance mappings (for example, to SOC 2, ISO 27001, or sector-specific rules) should be cross-checked against this scenario to ensure requirements around vendor risk, logging, and incident communication are met in practice, not just on paper.


Awareness Training

Awareness training should be updated to highlight smishing and targeted social engineering attacks against employees who manage or use critical SaaS platforms, emphasizing that attackers may use authentic vendors, tools, or recent activity and may ask staff to reset credentials, approve login attempts, or “verify” MFA in ways that mirror this incident. Training should acknowledge human failure modes such as fatigue with MFA prompts, over-trusting messages that reference fundamental tools (like analytics platforms), and lack of caution around SMS and messaging apps, then address them with simple, memorable decision rules and escalation paths. Role-specific modules should be built for admins and engineers (focusing on SaaS console access, MFA hygiene, and verifying out-of-band requests), finance and procurement (focusing on vendor-themed fraud and bogus invoices tied to real providers), customer-facing staff (recognizing when customers report suspicious messages referencing the service), and executives (who may be high-value phishing targets tied to vendor relationships). Employees should be taught to watch for behavioral indicators: unexpected messages about account issues from vendors, links requesting a full re-login outside expected flows, urgent or fear-based wording, and sign-in or MFA requests that appear while they are not actively logging in. Phishing simulations should incorporate realistic smishing and vendor-themed lures modeled on this scenario, with tailored scenarios for admin roles and leadership, and results should feed into reinforcement cycles that measure and report click rates, reporting behavior, and improvement over time, ensuring training effectiveness is tracked and continually refined.

Comments


Commenting on this post isn't available anymore. Contact the site owner for more info.
bottom of page