Technology

Dating Apps Scandal: 1.5 Million Private Photos Leaked - What You Need to Know Now!

2025-03-30

Author: Emma

In a shocking revelation, cybersecurity researchers have uncovered nearly 1.5 million private images from various dating apps – many of which are explicit in nature – stored online without any password protection, making them an easy target for hackers and potential extortionists.

The exposed photos originated from five dating platforms developed by M.A.D Mobile, including BDSM People and Chica for kink enthusiasts, as well as LGBT apps Pink, Brish, and Translove. Collectively, these services are estimated to be utilized by around 800,000 to 900,000 individuals seeking relationships.

M.A.D Mobile reportedly received warnings about the glaring security flaw back on January 20, but it wasn’t until the BBC reached out recently that any action was taken. The issue has since been resolved, although the company has remained tight-lipped about the specifics of how this lapse occurred and why it took so long to address it.

Ethical hacker Aras Nazarovas from Cybernews was the first to identify the vulnerability. His investigatory work involved analyzing the underlying code of the apps, which led him to the unsecured online storage location. He expressed his astonishment at being able to access the images without any security measures in place. “The first app I explored was BDSM People, and the very first image I came across was that of a naked man in his thirties. Instantly, I understood that this folder should not have been accessible to the public,” he stated.

The vast array of uncovered images included not only profile pictures but also intimate images shared through private messaging, along with some that had previously been removed by moderators. The ramifications of this unsecured exposure represent a significant risk, particularly for users residing in countries where LGBT individuals face severe persecution.

While text content from private messages was secured, the naked pictures did not bear user names or real identities, potentially complicating the process for malicious actors seeking to target specific individuals.

In response to the incident, a spokesperson for M.A.D Mobile acknowledged the existence of the vulnerability and expressed gratitude to Nazarovas for highlighting the issue before a more severe data breach could transpire. “We appreciate their work and have already taken the necessary steps to address the issue. An additional update for the apps will be rolled out on the App Store in the coming days,” they stated.

However, questions remain unanswered regarding the whereabouts of the company and the timeline involved in correcting the vulnerability after multiple warnings were issued. Typically, security researchers opt to wait until vulnerabilities are rectified before announcing them to the public, to minimize risks for users. Tragically, Nazarovas and his team felt compelled to raise the alarm while the vulnerability still existed, driven by concern that M.A.D Mobile was apathetic about rectifying it.

"Deciding to go public while the threat was live isn’t easy, but we believe it’s crucial for users to be informed to protect themselves," Nazarovas remarked.

This data leak echoes previous scandals, such as the infamous Ashley Madison breach in 2015, when hackers lifted sensitive data from a website catering to unfaithful partners. As the world becomes more digital, this incident serves as a powerful reminder of the importance of robust cybersecurity practices, particularly as dating apps become increasingly popular avenues for personal connections.