If you have spent any time looking for love online recently, you might want to take a quick break from swiping to check your security settings. The dating apps Bumble and Match reportedly hit in cyberattack headlines are not just clickbait; they are part of a growing wave of social engineering attacks targeting major American companies. It seems that even the quest for romance is not safe from the reach of high level cybercriminals.
The group claiming responsibility for these incidents is none other than ShinyHunters, a name that has become synonymous with massive data exfiltration over the last few years. Instead of using complex software exploits to kick down the digital door, these hackers are increasingly relying on “vishing” (voice phishing) and social engineering to trick employees and contractors into handing over the keys to the kingdom.
What happened at Bumble
According to reports that surfaced in late January 2026, Bumble, which also operates Badoo and BFF, confirmed that a contractor’s account was compromised in a phishing attack. This allowed a threat actor to gain “brief unauthorized access” to a small portion of their internal network. While that sounds terrifying, the company was quick to clarify that the breach was contained relatively quickly.
Bumble has stated that based on their internal investigation, the intruders did not manage to get into the primary member database. This means that your specific user account, your private messages, and your profile photos should remain secure. However, ShinyHunters claims a different story. The group allegedly posted on their leak site that they stole thousands of internal documents, many of which were marked as restricted or confidential, sourced primarily from Google Drive and Slack. It is a classic “he said, she said” situation where the truth likely lies somewhere in the middle.
The situation at Match Group
Match Group, the massive umbrella company that owns Tinder, Hinge, OkCupid, and several other platforms, also confirmed a separate security incident. They reported that a “limited amount of user data” was affected, though they were quick to point out that there is no indication that login credentials, financial information, or private communications were accessed.
The hackers, however, have made much bolder claims. ShinyHunters asserted on the dark web that they accessed up to 10 million records belonging to Match Group. Independent researchers who viewed samples of the leaked data found internal documents that appeared to list user matches and biographical descriptions from the Hinge app. While it might not be your credit card number, having your private dating preferences and bio details floating around the web is still a significant invasion of privacy.
The rise of vishing and social engineering
The most concerning part of this story is not just the data that was taken, but how the hackers got in. Cybersecurity firms like Mandiant have warned that ShinyHunters has moved away from traditional ransomware encryption. They have found that stealing data is cheaper, faster, and just as lucrative through extortion.
They are primarily using vishing, which involves calling employees or contractors and pretending to be from the IT department or tech support. They trick these individuals into providing their single sign-on (SSO) credentials or completing a multi-factor authentication (MFA) prompt. Once they have that access, they can move laterally through internal tools like Slack, Jira, and Google Drive. It is a reminder that the weakest link in any security chain is often the human element.
Why dating data is so valuable
You might wonder why a hacker would care about who you matched with on Hinge. The reality is that dating apps contain incredibly sensitive “PII” or personally identifiable information. Your home address, your workplace, your birth date, and even your sexual orientation are often stored on these platforms.
This data is a goldmine for identity theft and targeted phishing scams. If a scammer knows you are active on Bumble, they can send you a very convincing fake email about a “missed message” that leads you to a malicious site. The more they know about you, the more believable their lies become. This is why the reports of thousands of internal documents being stolen are so worrying; it gives criminals a blueprint of how these companies operate and how to better target their users.
If you are using the Bumble or Tinder apps, make sure you are running the latest version. Both companies have released security patches in the weeks following the incident to harden their systems against the specific tactics used by ShinyHunters.
There is no “price” to pay for these updates as they are standard software maintenance. However, if you have been notified that your data was part of the breach, you may be eligible for credit monitoring services provided by the companies. Check your email for official communication from Match Group or Bumble, but be careful of fakes. Always go directly to the official app or website to confirm any security alerts rather than clicking links in an email.

