Match Group (Tinder, Hinge, OkCupid) Data Breach — January 2026
ShinyHunters claimed responsibility for stealing over 10 million Match Group user records in early 2026. The breach allegedly stemmed from credential compromise or third-party access weakness.
- Names
- Email addresses
- IP addresses
- Transaction records
- Internal documentation
ShinyHunters claimed responsibility for stealing over 10 million Match Group user records in early 2026. The exposed dataset includes names, email addresses, IP addresses, transaction records, and what appears to be internal Match Group documentation. The breach allegedly stemmed from credential compromise or weakness in third-party access controls.
Dating profiles often contain highly personal details — preferences, location data, photos, partner history — that doxxers can chain with other leaks to reveal real-world identities. Gamers, streamers, and creators using these platforms for social connection face heightened risks of targeted harassment when their dating profiles get correlated with their public handles.
Want the rest of this breakdown?
Sign up free to keep reading. Members get extended access, the weekly breach digest, and a complimentary DoxxScan™ to see if their identity is exposed in the breaches we cover.
Were you affected by this breach?
See exactly what an attacker can piece together from your email, username, or handle. Free first scan, no credit card.
Try DoxxScan — 72hr free trial →