HIGH SEVERITYDating

Color Dating Data Breach

Color Dating Interracial Dating App Breach (2018): 222K User Profiles Including Photos, Location & Passwords Exposed

Interracial dating app designed for diverse matchmaking and social discovery.

Verified by ObscureIQ Intelligence

7.0Severity
222KRecords
7Fields
2018Year

ObscureIQ Breach Intelligence Scores
7.0
Breach Risk Index
25
Data Value
25
Market Recency
419
days
Since Breach

Risk Interpretation

High sensitivity. Exposure enables harassment, stalking, extortion, and identity linkage around race, dating behavior, and intimate preferences.

🎯 Impact & Downstream Threats

The institutional impact on Color Dating has been limited because of the late public disclosure, the relatively small scale of the affected user base, and the platform's apparent absence from active operation. No formal regulatory action has been documented, and civil litigation has been minimal because the underlying incident occurred in 2018, placing many class-action timelines outside applicable statutes of limitation. The reputational impact concentrated on the broader niche-dating-platform

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Identity verification bypass using name + date of birth combination
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Identity verification bypass
Phishing, credential stuffing & account takeover
Name-based social engineering
Pattern-of-life analysis & physical surveillance
Credential stuffing & account takeover
Social engineering context
Deepfake & identity document fraud

📋 Breach Intelligence

EntityColor Dating
Organization • Global
Breach Date2018-09-05
DBC Added2025-03-04
Added Date2025-03-04
Records~222K (221,707 records)
Attack VectorMisconfiguration
Threat ActorUnknown
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityElevated
Breach ID314;315
StatusConfirmed

📝 Executive Summary

Color Dating, a mobile dating application focused on interracial matchmaking, suffered a data breach in September 2018 that exposed user profile data for approximately 221,707 user accounts. The original compromise vector and specific vulnerability have not been publicly detailed by Color Dating. The breach data was redistributed as part of a larger corpus of breach data circulating among breach-trading communities and was publicly indexed by DataBreach.com and Have I Been Pwned on March 3-4, 2025, approximately six and a half years after the original incident.

The breach affected approximately 221,707 user accounts based on records indexed by breach-tracking services. Compromised fields included email addresses, full names, dates of birth, user biographical information, profile photographs, geographic location data, and passwords stored as bcrypt hashes. The bcrypt password storage represents modern cryptographic practice and provides meaningful resistance to brute-force cracking, though weak or commonly used passwords may still be recoverable with sustained computational effort. The combination of profile photographs with precise geographic location data, dates of birth, and dating-platform context creates an unusually sensitive identification risk because affected users can be visually and contextually identified across multiple data points.

For affected users, the practical risk profile combines credential-reuse exposure with niche-dating-platform-specific reputational risk. The combination of name, date of birth, email address, and bcrypt-hashed password supports both credential-stuffing attacks against other accounts and synthetic-identity-fraud risk where the password values are eventually recovered. More distinctively, inclusion in the Color Dating dataset confirms a dating-platform relationship explicitly framed around interracial dating, which can support targeted harassment, doxxing, or extortion campaigns referencing race and dating behavior. The exposure of profile photographs combined with geographic location data creates physical-identification risk because users can be visually matched to specific cities or regions. Affected users who receive extortion attempts should not pay ransom demands because payment does not stop further extortion. Users should change any reused passwords on other accounts, enable two-factor authentication where available, document any extortion communications, and report extortion attempts to law enforcement. Users with concerns about the disclosure timing should be aware that the original breach occurred in September 2018 and the data has been in circulation among threat actors for over six years, meaning passwords from that era should be treated as compromised across all uses.

🏢 About Color Dating

Color Dating, also branded as ColorDate (colordate.app), was a niche dating mobile application designed to facilitate matchmaking between users of different ethnic and racial backgrounds, marketed primarily to users seeking interracial dating relationships. The platform operated as an account-based mobile dating service with user profiles including biographical information, profile photographs, dates of birth, geographic location data, and personal-preference settings tied to interracial matchmaking. As a niche dating platform with explicit ethnicity-related framing, Color Dating maintained substantially more sensitive demographic and identity data than mainstream dating platforms because platform membership inherently signals user attitudes about race and dating preferences.

Platform | Niche dating and matchmaking | Interracial dating platform | Global
Globalcolordate.app

🗂 Why They Hold Your Data

Niche dating platforms collect highly sensitive profile data, photos, messages, relationship preferences, subscription records, and identity attributes tied to interracial matchmaking.

📰 Recent Developments

The Color Dating breach surfaced publicly on March 3-4, 2025 when the data was indexed by DataBreach.com and Have I Been Pwned approximately six and a half years after the original September 2018 incident. Color Dating itself has not publicly detailed the original incident, the specific vulnerability that enabled the compromise, or post-incident security measures. The breach is one of multiple niche-dating-app breaches that surfaced during the 2024 to 2025 redistribution wave when historical breach datasets were repackaged and distributed by breach-trading communities. The case has been cited in dating-app cybersecurity commentary as illustrating the long-tail exposure risk for users of niche dating platforms whose membership alone reveals sensitive personal preferences.

🔍 Data Points Exposed

7 verified field types:
Email;Bios
Dates of birth
Email
Geographic locations
Names
Passwords
Profile photos

Exposure Categories

LocationGEO LOCS

Canonical Fields

date_of_birth, email_address, full_name, geographic_locations, password, profile_bio, profile_photo

🌐 Dark Web Verification

Confirmed

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Color Dating
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationDatingEmailPasswordsDOB

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom