
User data linked to Tinder, Hinge and OkCupid was exposed after a breach at their parent company. Here’s what happened and what wasn’t accessed.
Match Group, the parent company of several widely used dating platforms including Tinder, Hinge, OkCupid, Match.com and Meetic, has acknowledged it suffered a cybersecurity incident after criminals claimed to possess internal data tied to multiple services.
The confirmation followed the release of compressed files allegedly consisting of millions of records linked to dating apps.
According to Match Group, the intrusion resulted in the exposure of a limited amount of user data. The company says it moved quickly to shut down the unauthorized access once the incident was identified and launched an investigation with the help of external cybersecurity specialists.
While attackers claimed the stolen files included user-related information and internal documents, Match Group said it has currently no evidence that login credentials, financial details or private messages were accessed. The company emphasized that the scope of the breach remains contained.
Notifications are being issued where appropriate, as the investigation unfolds. With an ecosystem spanning tens of millions of users globally, even a limited exposure has prompted scrutiny over how attackers gained their foothold.
The incident has been linked to a broader campaign attributed to the ShinyHunters threat group, which has recently focused on voice phishing and deceptive login portals targeting enterprise single sign-on (SSO) environments. In this case, attackers reportedly gained access by compromising an SSO account rather than exploiting a software vulnerability.
Once inside, the attackers were able to reach marketing analytics tools and cloud-based storage services, illustrating once more how social engineering can bypass perimeter defenses and lead to secondary data exposure without breaching core systems.
For individuals whose personal information may be circulating after the Match Group incident, tools like Bitdefender Digital Identity Protection offer an additional layer of visibility and alerts that extends beyond basic account notifications.
This service continuously scans public and dark web sources for exposed personal details, including email addresses, phone numbers and other identifiers. It sends real-time alerts if new breaches or impersonation risks are detected, enabling users to react quickly by updating credentials or freezing accounts.
Tinder itself was not directly hacked, but user data linked to Tinder was exposed following a security incident at its parent company, Match Group. The breach stemmed from unauthorized access to internal systems rather than a flaw in the app itself.
According to Match Group, there is no evidence that login credentials, financial information or private messages were accessed. The company says the exposed data mainly consisted of tracking information.
Users are advised to stay alert for phishing attempts, review account activity and use breach-monitoring or identity-protection services that can flag exposed personal information and follow-on risks.
tags
Vlad's love for technology and writing created rich soil for his interest in cybersecurity to sprout into a full-on passion. Before becoming a Security Analyst, he covered tech and security topics.
View all postsDecember 18, 2025
December 11, 2025