Match Group Suffers Alleged Breach According to Dark Web Reports

UpGuard Team
UpGuard Team
January 29, 2026

Key facts: Match Group data breach (alleged)

  • Date reported: January 28, 2026.
  • Threat actor: ShinyHunters (also known as Scattered LAPSUS$ Hunters).
  • Records involved: Over 10 million user records (alleged).
  • Affected platforms: Match, Hinge, and OkCupid.
  • Data types: Reported to include user IDs, Hinge subscription data (transaction IDs, amounts paid), IP addresses, internal employee emails, and corporate contracts.
  • Alleged attack method: "Vishing" (voice phishing) targeting Okta single sign-on (SSO) credentials and mobile analytics platform AppsFlyer.
  • Severity: Classified as informational, as Match Group has stated that user login credentials, financial information, and private communications do not appear to have been accessed.

What happened in the alleged Match.com data breach?

Match Group (match.com), the operator of popular dating platforms such as Hinge and OkCupid, was involved in an alleged data leak incident reported on January 28, 2026. The threat actor group known as ShinyHunters has claimed responsibility for the security event, suggesting that a significant volume of data was exfiltrated from the company’s digital environment.

According to these unverified reports, the incident allegedly led to the exposure of over 10 million records. The leaked information is claimed to include sensitive corporate documents, Hinge matches, and subscription transaction details. While the severity is currently categorized as informational, Match Group has confirmed it is investigating the claims and acted quickly to terminate the reported unauthorized access. Such alleged exposures typically increase the risk of targeted phishing for the platform's users.

Who is behind the incident?

The threat actor group ShinyHunters is alleged to be behind this incident. This group is a prolific cybercriminal entity known for targeting high-profile corporations and leaking or selling large databases on dark web forums. Active since at least 2020, they have been linked to numerous significant data breaches across the technology and finance sectors. Their reported methods often involve sophisticated social engineering, such as voice phishing (vishing), to compromise administrative credentials. ShinyHunters often seeks notoriety or financial gain through the public distribution of stolen data.

Impact and risks for Match customers

For individuals who use Match Group services, the potential exposure of names, email addresses, and subscription details presents several security risks. If the data is authentic, malicious actors could use this information to launch sophisticated phishing campaigns or social engineering attacks. Furthermore, the alleged leak of internal documentation and employee emails could provide threat actors with insights into the company’s internal operations, potentially facilitating future credential abuse.

Typical outcomes of such alleged leaks include a rise in fraudulent communications and a heightened need for user vigilance. Match Group has stated that they believe the incident affects a limited amount of user data and that they are in the process of notifying individuals as appropriate. To mitigate potential risks, users are encouraged to update their security settings and remain skeptical of unsolicited messages.

Frequently asked questions

What happened in the alleged Match.com security breach?

On January 28, 2026, the hacking group ShinyHunters claimed to have stolen over 10 million records from Match Group platforms, including Hinge and OkCupid. The group alleged they gained access through social engineering tactics targeting internal systems. Match Group has confirmed a security incident involving a "limited amount of user data" but noted that core login and financial information appear safe.

When did the alleged Match.com breach occur?

While the report was published on January 28, 2026, reports suggest the unauthorized access may have occurred as early as mid-January. Match Group stated they acted quickly to terminate the access once the claims surfaced.

What data was reportedly exposed?

The alleged leak is said to include user IDs, IP addresses, transaction records for Hinge subscriptions, and internal corporate documents. Importantly, Match Group has stated there is no indication that private communications or user passwords were part of the exposure.

Is my personal information at risk?

While these reports remain alleged, if you have an account with Hinge, Match, or OkCupid, it is wise to be cautious. The presence of user IDs and transaction history in a leak can be used by scammers to create highly targeted phishing attempts. Stay alert for official notifications from Match Group.

How can I protect myself from this alleged data breach?

  • Change your account passwords immediately, especially if you reuse them elsewhere.
  • Enable multi-factor authentication (MFA) on all sensitive dating and social accounts.
  • Monitor your financial statements for any unrecognized transactions related to subscriptions.
  • Be cautious of unsolicited emails or texts that reference your dating profile or subscription status.
  • Use breach monitoring tools to track whether your information appears in confirmed leaks.

What steps should companies take after being targeted by an alleged breach?

Organizations typically respond to such claims by conducting forensic investigations to verify the data, securing systems, and notifying affected parties. They are also encouraged to review security protocols—particularly around social engineering defenses—and deploy attack surface management tools to mitigate future risks.

How secure is Match Group?

Match.com is an online dating and relationship service that operates as a subsidiary of Match Group, providing a platform for individuals to create personal profiles and utilize algorithmic matching systems to establish romantic connections.
  • Check icon
    View our free preliminary report on Match Group’s security posture
  • Check icon
    13 risk factors, including email security, SSL, DNS health, open ports and common vulnerabilities
https://match.com
Security ratings
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.

Latest news

Stay up-to-date with the latest news in cybersecurity.
UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

Protect your organization

Get in touch or book a free demo.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating