By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Scoopico
  • Home
  • U.S.
  • Politics
  • Sports
  • True Crime
  • Entertainment
  • Life
  • Money
  • Tech
  • Travel
Reading: Hackers claim they accessed Tinder, Hinge user info
Share
Font ResizerAa
ScoopicoScoopico
Search

Search

  • Home
  • U.S.
  • Politics
  • Sports
  • True Crime
  • Entertainment
  • Life
  • Money
  • Tech
  • Travel

Latest Stories

The flawed assumptions behind Matt Shumer’s viral X post on AI’s looming impact
The flawed assumptions behind Matt Shumer’s viral X post on AI’s looming impact
American snowboarder Chloe Kim takes silver in women’s halfpipe, falls short of Olympic three-peat
American snowboarder Chloe Kim takes silver in women’s halfpipe, falls short of Olympic three-peat
Special education students succeed in charter schools
Special education students succeed in charter schools
Will Halo Campaign Evolved have multiplayer? Here’s what the developers said
Will Halo Campaign Evolved have multiplayer? Here’s what the developers said
Iron Mountain Q4 2025: Record .8B Revenue, Strong 2026 Guidance
Iron Mountain Q4 2025: Record $1.8B Revenue, Strong 2026 Guidance
Have an existing account? Sign In
Follow US
  • Contact Us
  • Privacy Policy
  • Terms of Service
2025 Copyright © Scoopico. All rights reserved
Hackers claim they accessed Tinder, Hinge user info
Tech

Hackers claim they accessed Tinder, Hinge user info

Scoopico
Last updated: January 30, 2026 3:04 am
Scoopico
Published: January 30, 2026
Share
SHARE


Match Group, the conglomerate that owns Tinder, Hinge, and other dating apps, is investigating a security incident that exposed user data.

A hacker group called Scattered LAPSUS$ Hunters claimed they stole a mass of Match’s internal data, according to 404 Media. 404 Media downloaded the data and reported that it contained some users’ unique advertising IDs, corporate receipts, and other internal documents.

SEE ALSO:

Hinge’s founder is leaving Match to launch Overtone, an AI dating service

A Match spokesperson told Mashable, “We are aware of claims being made online related to a recently identified security incident. Match Group takes the safety and security of our users seriously and acted quickly to terminate the unauthorized access. We continue to investigate with the assistance of external cybersecurity experts.”

Mashable Trend Report

“There is no indication that user log-in credentials, financial information, or private communications were accessed. We believe the incident affects a limited amount of user data, and we are already in the process of notifying individuals, as appropriate,” the spokesperson continued.

A spokesperson for the hacking group told 404 Media that it gained access to Match’s documents through a social engineering tactic called vishing. Vishing is like phishing, except it’s done over the phone. Scammers impersonate a credible person or company to gain information or money. The hacker told 404 Media that the group vished Match’s Okta single-sign-on. Okta is a cybersecurity company that specializes in secure logins for companies. A spokesperson for Okta told 404 Media:

“Okta Threat Intelligence routinely shares threat research to help companies protect against evolving social engineering techniques. These target organizations in all industries and impersonate a range of identity and cryptocurrency providers. While Okta’s platform and services remain secure, Okta is calling attention to these evolving techniques to help raise awareness and support stronger defenses for customers.”

Hackers posted that they accessed Match’s data from the cloud platform AppsFlyer, but AppsFlyer denied that the incident originated from its app:

“AppsFlyer has confirmed that the incident referenced in recent media reports did not originate from AppsFlyer and did not involve a data breach, security incident, or compromise of AppsFlyer’s systems. AppsFlyer’s infrastructure and security controls were not breached. Any implication that AppsFlyer was the source of the incident, or that data was exposed due to a compromise of AppsFlyer systems, is inaccurate.”

Topics
Cybersecurity
Tinder

[/gpt3]

In the present day’s Hurdle hints and solutions for July 5, 2025
Early Black Friday TV deal: Save $125 on the Amazon 55-inch Omni Mini LED Hearth TV
Everything we know about Anya Taylor-Joy’s heist series, ‘Lucky’
Jon Stewart jokes about finding his own name in Epstein files
I wait all 12 months for these 27 traditional Black Friday offers
Share This Article
Facebook Email Print

POPULAR

The flawed assumptions behind Matt Shumer’s viral X post on AI’s looming impact
Money

The flawed assumptions behind Matt Shumer’s viral X post on AI’s looming impact

American snowboarder Chloe Kim takes silver in women’s halfpipe, falls short of Olympic three-peat
News

American snowboarder Chloe Kim takes silver in women’s halfpipe, falls short of Olympic three-peat

Special education students succeed in charter schools
Opinion

Special education students succeed in charter schools

Will Halo Campaign Evolved have multiplayer? Here’s what the developers said
Sports

Will Halo Campaign Evolved have multiplayer? Here’s what the developers said

Iron Mountain Q4 2025: Record .8B Revenue, Strong 2026 Guidance
business

Iron Mountain Q4 2025: Record $1.8B Revenue, Strong 2026 Guidance

The ‘God of War’ trilogy is getting a remake
Tech

The ‘God of War’ trilogy is getting a remake

Scoopico

Stay ahead with Scoopico — your source for breaking news, bold opinions, trending culture, and sharp reporting across politics, tech, entertainment, and more. No fluff. Just the scoop.

  • Home
  • U.S.
  • Politics
  • Sports
  • True Crime
  • Entertainment
  • Life
  • Money
  • Tech
  • Travel
  • Contact Us
  • Privacy Policy
  • Terms of Service

2025 Copyright © Scoopico. All rights reserved

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?