Code Defence Cyber security

ShinyHunters breach Match Group exposing 10 million user records across Tinder and Hinge

A major data breach has impacted a leading global dating platform provider, with threat actors claiming to have exfiltrated 10 million user records. The incident highlights the high risk associated with third-party integrations and credential compromise in large-scale consumer ecosystems.

The breach at @[Match Group](urn:li:organization:1053158) has been claimed by the ShinyHunters extortion group. The exfiltrated data reportedly includes user profiles, email addresses, internal documentation, and IP addresses from platforms including Tinder, Hinge, and OkCupid. Early forensic indicators suggest the breach may have originated from a compromise of a third-party partner system or the unauthorized use of administrative credentials.

The exposure of millions of user records in a dating ecosystem provides threat actors with a potent dataset for secondary targeted phishing and blackmail campaigns. This incident demonstrates that even with robust primary defenses, the complexity of modern partner ecosystems remains a primary entry point for data extortion.

– Enforce phishing-resistant multi-factor authentication across all @[Match Group](urn:li:organization:1053158) administrative and partner-facing accounts.

– Conduct an immediate review of all third-party API integrations and contractor access permissions.

– Implement strict data-at-rest encryption and monitor for large-scale data exfiltration events within cloud storage environments.

– Communicate clearly with affected users regarding the risks of secondary phishing and identity theft stemming from this breach.

Data breaches in high-volume consumer ecosystems are often identity-theft events that require a total reset of the partner trust model. #CodeDefence #MatchGroup #DataBreach #ShinyHunters
/

Scroll to Top