Match Group, the parent company of Tinder, Hinge, OkCupid, Match.com, and Plenty of Fish, confirmed a cybersecurity incident after the hacking collective ShinyHunters published a 1.7 GB archive claiming 10 million records from the company’s platforms. The breach resulted from a voice phishing (vishing) attack that compromised an employee’s Okta SSO credentials.

Incident overview

AttributeDetails
VictimMatch Group (Tinder, Hinge, OkCupid, Match.com)
Threat actorShinyHunters (UNC6661)
Records claimed10 million
Data volume1.7 GB compressed
Attack vectorVishing targeting Okta SSO
Phishing domainmatchinternal[.]com
Access gainedAppsFlyer, cloud storage

Timeline

DateEvent
Early-mid January 2026Vishing campaign targeting Match Group employees
January 2026Employee Okta credentials compromised
January 27, 2026ShinyHunters posts data to BreachForums
January 28, 2026Match Group confirms incident and investigation
January 29, 2026Public disclosure

Attack method

ShinyHunters used a sophisticated social engineering technique targeting single sign-on (SSO) accounts:

Vishing attack chain

PhaseAction
1. Phone callAttackers posing as IT staff call employees
2. PretextClaim company is updating MFA settings
3. Credential harvestingDirect victims to matchinternal[.]com (lookalike domain)
4. MFA captureCapture SSO credentials and MFA codes in real-time
5. Device registrationRegister attacker device for MFA
6. Data accessUse compromised Okta account to access connected services

This technique—combining phone-based social engineering with real-time credential capture—bypasses traditional MFA protections by capturing codes as they’re entered.

Why this bypasses MFA

FactorImpact
Real-time captureMFA code valid during phone call
Device registrationAttacker registers own MFA device
Trust exploitationVictim believes IT staff is legitimate
SSO accessSingle credential unlocks multiple services

What was stolen

Confirmed exposed data

Data TypePlatforms affected
User advertising IDsHinge, Match.com, OkCupid
Transaction IDsPremium feature payments
Subscription amountsHinge subscriptions
IP addressesAll platforms
Geographic locationsAll platforms
Full namesAll platforms

Hinge-specific exposure

Data TypeRisk level
Match records between usersHigh—reveals relationships
Dating profile bios and textHigh—personal content
User preferencesMedium—personal information

Disputed claims

ShinyHunters claimMatch Group response
Google Drive access”Not accessed based on investigation”
Dropbox files”Not accessed based on investigation”
Internal documentsUnder investigation

NOT exposed (per Match Group)

Data TypeStatus
Login credentialsNot compromised
Financial informationNot compromised
Private messagesNot compromised
Tinder dataNot mentioned in leak
Plenty of Fish dataNot mentioned in leak

AppsFlyer connection

ShinyHunters’ leak site pointed to AppsFlyer, a marketing analytics provider, as the data source.

AppsFlyer’s denial

“The incident did not originate from AppsFlyer, nor did it involve a data breach, security incident, or compromise of AppsFlyer’s systems.”

The data appears to have been accessed through Match Group’s AppsFlyer instance after the SSO compromise, not from AppsFlyer directly.

Part of a larger campaign

Match Group was one of several organizations hit in ShinyHunters’ January 2026 vishing spree:

TargetRecordsStatus
Match Group10M claimedConfirmed
Panera Bread5.1M accountsConfirmed
SoundCloudUnknownUnder investigation
CrunchbaseUnknownUnder investigation

All attacks used the same technique: impersonating IT staff to harvest SSO credentials and MFA codes.

Campaign infrastructure

IndicatorPattern
Domain format<companyname>sso.com or <companyname>internal.com
RegistrarNICENIC
PretextMFA update announcement
TargetOkta, Microsoft, Google SSO
Organizations targeted100+ high-value companies

Privacy implications

Dating platform data carries unique risks compared to typical breaches:

Dating-specific concerns

Data typeRisk
Profile contentReveals personal details, preferences, lifestyle
Match historyExposes relationship connections
IP addressesEnables geolocation, especially concerning for anonymous users
Advertising IDsCross-platform tracking, correlation with other datasets
Subscription dataFinancial patterns, premium feature usage

Potential exploitation

ScenarioRisk
DeanonymizationCorrelate advertising IDs with other data sources
Targeted phishingUse profile content for social engineering
Relationship exposureMatch records reveal who connected with whom
Blackmail riskDating activity could be used for extortion
ImpersonationLeaked profiles enable fake account creation

For Hinge users specifically, leaked match records and profile text could enable identification of real-world individuals—or provide material for targeted social engineering.

About ShinyHunters

ShinyHunters (also tracked as UNC6661) is one of the most prolific data breach groups currently active:

Recent ShinyHunters breaches

YearTargetRecords
2024Ticketmaster560 million
2024AT&T (call metadata)110+ million
2024Santander Bank30 million
2026Match Group10 million claimed

Evolution in tactics

Previous approachCurrent approach
Database exploitationSSO social engineering
Technical vulnerabilitiesHuman trust exploitation
Direct system accessThird-party service abuse

The group’s pivot to vishing attacks targeting SSO systems represents an evolution from their earlier database exploitation techniques.

Match Group’s response

“Match Group takes the safety and security of our users seriously and acted quickly to terminate the unauthorized access.”

ActionStatus
Access terminatedComplete
InvestigationOngoing
User notificationIn progress
Law enforcementEngaged

Recommendations

For Match Group users

PriorityAction
HighEnable two-factor authentication if not already active
HighUse unique passwords for dating apps
HighReview profile content—consider removing identifying details
MediumWatch for targeted phishing using leaked profile data
MediumMonitor for impersonation—leaked profiles could create fake accounts
OngoingBe cautious of “Match Group security” communications

For organizations

The Match Group breach demonstrates that MFA alone doesn’t stop determined attackers:

ControlPurpose
Phishing-resistant MFAHardware keys, passkeys (not SMS/TOTP)
Employee vishing trainingRecognize IT impersonation tactics
SSO anomaly monitoringNew device registrations, unusual access patterns
Domain monitoringDetect lookalike phishing domains early
Conditional access policiesRestrict SSO to managed devices

For security teams

PriorityAction
CriticalImplement phishing-resistant MFA for SSO
HighTrain employees on vishing identification
HighMonitor for SSO device registration anomalies
HighImplement domain monitoring for brand impersonation
MediumReview third-party service access patterns

Context

The Match Group breach highlights the unique sensitivity of dating platform data. Unlike typical corporate breaches, dating information reveals intimate personal details, relationship patterns, and lifestyle choices that users expected to remain private.

The vishing attack vector demonstrates that even organizations with MFA can be compromised through social engineering. When attackers call employees, claim to be IT staff, and capture credentials in real-time, traditional MFA provides no protection.

For users of dating platforms, the breach serves as a reminder that digital dating creates permanent records that can be exposed. Consider what information you share in profiles and whether that data could be used against you if leaked.