
ShinyHunters Match Group data breach exposes 10M+ dating app user records via AppsFlyer, raising major privacy, fraud, and regulatory risks.
Author: Kritika Gupta
29th January 2026- The Match Group data breach has become one of the most serious privacy incidents in the online dating sector this year. ShinyHunters has claimed responsibility for leaking more than 10 million user records. These records linked to Match Group dating apps, including Hinge, Match.com, and OkCupid. The breach surfaced on January 28, 2026, and it includes highly sensitive user-linked information such asUser IDs, IP addresses, swiping and matching behavior, subscription details, and geolocation data. It also allegedly includes internal corporate material, including employee emails and contracts.
Match Group, which also owns Tinder and Plenty of Fish, has confirmed it is investigating the claims. Importantly, Match said the data appears to have been accessed through AppsFlyer, a third-party mobile analytics platform used by apps to track user behavior and performance.
High Signal Summary For A Quick Glance
Rory J Bernier
@RoryCrave
Hackers say they've hacked Match Group, maker of Hinge, OkCupid https://t.co/p8ki243yZD
12:00 AM·Jan 29, 2026
JustaBreach
@justabreach
🚨🇺🇸 Match Group (MTCH) : Alleged Massive US Dating Empire Breach (28/01/2026) by ShinyHunters Victim: Match Group, Inc. NASDAQ:MTCH US-based tech giant headquartered in Dallas, Texas Owns the world's largest portfolio of dating apps: Tinder (main revenue driver), Hinge, https://t.co/iDYTdT0egG

09:03 AM·Jan 28, 2026
Dominic Alvieri
@AlvieriD
Match, Hinge and OKCupid usage data leaked by ShinyHunters 10 million records released https://t.co/9CQO9IpTSy

01:55 AM·Jan 28, 2026
This breach fits ShinyHunters’ established playbook. The group repeatedly relies on social engineering, particularly voice phishing (vishing), to trick employees into granting access to systems. In this case, attackers likely exploited access tied to AppsFlyer systems or credentials connected to that environment.
In addition, the incident aligns with a broader trend in cybercrime: attackers target SSO credentials and OAuth access to move inside cloud platforms without triggering immediate detection. That approach allows threat actors to extract large datasets quickly, especially when enterprises store behavioral analytics externally.
While this is the first major publicly confirmed breach tied directly to Match Group, ShinyHunters has operated since at least 2020 and has a long record of high-impact leaks. The group previously targeted companies such as: AT&T in 2024 and other firms and datasets involving Microsoft ecosystems.
Key milestones related to this development
The group gains attention after large-scale breaches, including major e-commerce database leaks, building a reputation for selling and leaking stolen user data.
ShinyHunters is linked to multiple major leaks, including datasets tied to large consumer brands, reinforcing its pattern of mass theft and exposure-driven pressure tactics.
Attack campaigns increasingly target vendors like analytics platforms and cloud integrations, where compromising one provider can expose multiple apps and datasets.
ShinyHunters claims it leaked 10M+ user records tied to Match Group apps like Hinge, OkCupid, and Match.com, with Match Group investigating and pointing to AppsFlyer as the likely access path.
Security teams validate breach scope, impacted records, and exposure type, while user advisories, legal scrutiny, and third-party integration hardening begin.
The leaked dataset creates unusually severe risk because dating platforms hold deeply personal and behavior-rich information. Even without passwords or full payment data, threat actors can still weaponize exposed data for real harm. That is why the Match Group data breach stands out as more than a routine cyber incident.
Most importantly, geolocation information, match history, and behavior signals can help criminals infer personal routines and identity. As a result, attackers can use the data for many things. Targeted phishing campaigns that feel real because they reference app-specific behaviour are result of such breaches.
Experts advise affected users to change passwords on Match Group apps and any other accounts where they reused credentials. Additionally, users should enable two-factor authentication and monitor financial activity and credit reports for suspicious signals.
Going forward, Match Group will likely accelerate its forensic investigation and tighten access controls across AppsFlyer and other third-party analytics tools. Meanwhile, regulators could increase scrutiny as privacy risks rise, especially around geolocation and behavioral tracking.
As a result, the company may face class-action lawsuits and higher compliance costs. This in return can pressure sentiment in the near term. However, if Match contains the incident quickly and proves no passwords or payment data leaked, the market impact may remain limited. In addition, this breach will push dating platforms to reduce data collection and strengthen vendor security audits.
Our Crypto Talk is committed to unbiased, transparent, and true reporting to the best of our knowledge. This news article aims to provide accurate information in a timely manner. However, we advise the readers to verify facts independently and consult a professional before making any decisions based on the content since our sources could be wrong too. Check our Terms and conditions for more info.
Strive Enters Top 10 Corporate Bitcoin Holders After 334 BTC Buy
Goldfish social leaderboard: Activity based airdrop
ShinyHunters Exposes 10M Users in Match Group Data Breach
Uniswap onchain auctions coming to the web app in February 2026
Strive Enters Top 10 Corporate Bitcoin Holders After 334 BTC Buy
Goldfish social leaderboard: Activity based airdrop
ShinyHunters Exposes 10M Users in Match Group Data Breach
Uniswap onchain auctions coming to the web app in February 2026