Major data breach at popular hookup app leaks data on millions of users – see if you’re safe


- Cybernews found an unescured MongoDB instance belonging to Headero
- The database contained millions of records and PII
- It has since been locked down, but users should still be on their guard
Security researchers from Cybernews have reported uncovering a massive MongoDB instance belonging to a dating and hookup app called Headero.
The database contained more than 350,000 user records, more than three million chat records, and more than a million chat room records.
Among the exposed data are names, email addresses, social login IDs, JWT tokens, profile pictures, device tokens, sexual preferences, STD status, and – extra worryingly – exact GPS locations.
No evidence of abuse
Cybernews reached out to the app’s developers, a US-based company named ThotExperiment, which immediately locked the database down. The company told the researchers that it was a test database, but Cybernews’ analysis indicates that it could have been actual user data, instead.
Unfortunately, we don’t know for how long the database remained open, and if any threat actors accessed it in the past. So far, there is no evidence of abuse in the wild.
Human error leading to exposed databases remains one of the most common causes of data leaks and security breaches.
Researchers are constantly scanning the internet with specialized search engines, finding massive non-password-protected databases almost daily.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
These leaks can put people at risk, since cybercriminals can use the information to tailor highly convincing phishing attacks, through which they can deploy malware, steal sensitive files, and even commit wire fraud.
Headero users are advised to be extra vigilant when receiving unsolicited messages, both via email and social platforms.
They should also be careful not to download any files or click on any links in such messages, especially if the messages carry a sense of urgency with them. If they are using the same password across multiple services, they should change them, and clear sessions / revoke tokens in apps, where possible.
You might also like
Cybernews found an unescured MongoDB instance belonging to Headero The database contained millions of records and PII It has since been locked down, but users should still be on their guard Security researchers from Cybernews have reported uncovering a massive MongoDB instance belonging to a dating and hookup app called…
Recent Posts
- Google will reduce Pixel 6A battery capacity due to overheating issues
- Major data breach at popular hookup app leaks data on millions of users – see if you’re safe
- My Virtual Avatar No Longer Looks Terrible in the Apple Vision Pro
- Wikipedia pauses AI summaries after editors skewer the idea
- FCC’s last Democratic commissioner doesn’t know why Trump hasn’t fired her yet
Archives
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010