The ShinyHunters cybercrime group, a criminal hacking collective active since 2020, has claimed responsibility for a reported data breach involving dating apps operated by Match Group, Inc., including Hinge, OkCupid, and Match.com. The group announced on its dark-web leak site that it obtained more than 10 million records from the companies, though independent verification of the full claim has not been published.

 

 

In the posting, ShinyHunters included a compressed archive of about 1.7 GB that it said contains data from users of the specified dating platforms, as well as some internal documents. The uploaded sample was said to include user identifiers, transaction information, IP addresses, and other usage details, suggesting access to information tied to user profiles and activity logs.

Match Group, a major US-based technology company that owns and operates popular online dating services such as Hinge, OkCupid, and Match.com, did not immediately respond to requests for comment following the claim. At this stage, there is no independent confirmation from the company or third-party cybersecurity researchers that systems were compromised or that the posted data accurately reflects information taken from Match Group infrastructure.

The leaked sample reportedly includes details from Hinge that reflect lists of dating profiles alongside metadata such as transaction identifiers, payments for premium features, and blocked installation records tied to IP addresses and locations. The extent to which this material contains personally identifiable information such as names, email addresses, or phone numbers remains subject to ongoing analysis.

The posting also mentioned documents that appeared to originate from one of Match Group’s service partners, a mobile analytics and marketing platform, implying that attackers may have obtained data stored by third-party services linked to app usage and performance tracking. Inclusion of records from an unrelated video-based dating service was also noted in the sample, though the relevance of those files to Match Group accounts is unclear.

ShinyHunters is known for publishing purportedly stolen data when victims do not comply with extortion or ransom requests. The group has previously claimed responsibility for other high-profile breaches affecting organisations across sectors, including companies such as Salesforce, Crunchbase, and Panera Bread, though the authenticity of individual data sets can vary and is not always independently verified.

Security analysts note that large-scale breaches involving dating apps and social platforms can expose sensitive personal information and behavioural data, potentially increasing the risk of targeted fraud or phishing campaigns if the data is valid. Verification of the claim and a clear assessment of what specific categories of data, if any, were taken will depend on the response and investigation by Match Group and cybersecurity experts.

Match Group’s response to the claim and whether it will initiate an internal investigation, regulatory notifications, or communications to users has not been publicly disclosed at the time of reporting.

Site Disclaimer

2-remove-virus.com is not sponsored, owned, affiliated, or linked to malware developers or distributors that are referenced in this article. The article does not promote or endorse any type of malware. We aim at providing useful information that will help computer users to detect and eliminate the unwanted malicious programs from their computers. This can be done manually by following the instructions presented in the article or automatically by implementing the suggested anti-malware tools.

The article is only meant to be used for educational purposes. If you follow the instructions given in the article, you agree to be contracted by the disclaimer. We do not guarantee that the artcile will present you with a solution that removes the malign threats completely. Malware changes constantly, which is why, in some cases, it may be difficult to clean the computer fully by using only the manual removal instructions.

Leave a Reply