Over 10 million users
Between January 27-28, 2026, the prolific cybercrime group ShinyHunters claimed a significant data breach against Match Group, the operator of major online dating platforms. The threat actor alleges to have exfiltrated over 10 million records belonging to users of Hinge, OkCupid, and Match.com. As proof, a 1.7GB sample of the stolen data was posted on a dark web leak site. The compromised information reportedly includes a vast range of highly sensitive user data and internal corporate files. The alleged point of compromise is a third-party service provider, AppsFlyer, suggesting a supply chain attack. Match Group is currently investigating the claim, which, if confirmed, would represent a severe privacy violation for millions of users.
ShinyHunters is a well-known threat group famous for large-scale data breaches and selling stolen data on underground forums. Their latest claim targets Match Group's extensive user base. The group's post on a dark web forum details the scale of the breach and points the finger at a third-party mobile analytics provider, AppsFlyer, as the source of the leak. This tactic aligns with a growing trend of attackers targeting an organization's weaker supply chain partners to gain access to valuable data.
The data posted as a sample appears to contain a mix of user and corporate information:
The attack vector, as claimed by ShinyHunters, is a compromise of a third-party service, AppsFlyer. This is a classic Supply Chain Attack. Threat actors often find it easier to breach a smaller, less-secure vendor that has privileged access to a larger target's data and systems. If the claim is true, ShinyHunters likely compromised AppsFlyer's infrastructure and leveraged its API access or database connections to exfiltrate data belonging to Match Group and its subsidiaries.
The presence of authentication tokens in the leaked data is particularly concerning. If these tokens are still valid, they could be used by attackers to hijack user accounts without needing a password, potentially leading to further fraud or abuse.
The potential impact of this breach is severe for both users and Match Group.
Since this is a claimed breach of a third party, internal detection observables are limited. However, organizations can monitor for signs of data abuse.
| Type | Value | Description |
|---|---|---|
| User Account Pattern | Suspicious account logins | Monitor for logins from unusual locations or devices, or rapid changes to profile information, which could indicate account takeover using stolen auth tokens. |
| Domain | ShinyHunters leak site domain | Monitoring for mentions of your organization on known data leak sites is a key threat intelligence activity. |
| Email Address | Phishing emails referencing dating app usage | Employees should be warned of targeted phishing campaigns that leverage their potentially stolen data. |
For Users:
For Organizations (General):
Vendor Security Audits: Conduct regular and thorough security audits of all third-party vendors, especially those handling PII or other sensitive data. Ensure they meet your organization's security standards.
Data Minimization: Only share the absolute minimum amount of data necessary with third-party services. Review API integrations to ensure they don't expose more data than required.
API Security and Monitoring: Implement strong authentication and authorization for all API access. Monitor API usage for anomalous patterns, such as large data exports or access from unusual IP addresses.
Incident Response Planning: Have a clear incident response plan that includes communication and coordination with third-party vendors in the event of a breach in the supply chain.
This mitigation extends to third parties. Organizations should have a robust vendor risk management program that assesses the security posture of their supply chain partners.
Enforcing MFA for users can prevent account takeover even if authentication tokens or passwords are stolen.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats