Senior Dating Data Breach
Senior Dating (40+) Platform Breach (2024): 766K User Profiles Including Photos, Location & DOB Exposed via Firebase
Niche dating platform targeting users aged 40 and older.
Risk Interpretation
High sensitivity. Exposure enables romance scams, fraud, stalking, and identity theft, with older users potentially facing elevated targeting risk.
Impact & Downstream Threats
The institutional impact on Senior Dating and the broader operator was effectively terminal. Both Senior Dating and Ladies.com were shut down following the December 2024 disclosure, and the mobile applications were removed from app stores. The case has been widely cited in cybersecurity coverage as illustrating systemic data-protection failures at small dating-platform operators, including the use of cloud-database services without proper access-control configuration and the consistent pattern o
- Targeted phishing campaigns using exposed email addresses
- Doxxing risk from physical address exposure
- Employment-based social engineering using job and employer data
- Social media account targeting and impersonation
Threat Vectors
Breach Intelligence
Executive Summary
Senior Dating, a niche dating platform targeting users aged forty and older, suffered a data breach due to an exposed Firebase database that had been left publicly accessible without proper authentication or access-control configuration since approximately April 2024. The vulnerability was independently identified by security researcher 'BobDaHacker' who reported it to the platform operator in April 2024, and again by OSINT researcher Ryan Fae in late 2024. The operator did not remediate the vulnerability for approximately seven to eight months despite the disclosure attempts. Ryan Fae publicly disclosed the vulnerability on X on December 3, 2024 with details indicating the scope of the exposure, which prompted the operator to acknowledge the breach and shut down the platform on approximately December 4, 2024. The breach was indexed by Have I Been Pwned on December 9, 2024. The same operator's sister property Ladies.com (a lesbian dating platform) also suffered an analogous Firebase exposure, with the combined breach across both platforms affecting approximately 917,000 users.
The breach affected approximately 765,517 users on Senior Dating based on records indexed by breach-tracking services. Compromised fields included email addresses, full names, dates of birth, profile photographs, biographical information, geographic location data with precise latitude and longitude coordinates, gender, education levels, occupations, relationship statuses, drinking and smoking habits, and Facebook social media profile linkages. The dataset did not include passwords because Firebase authentication is typically managed through linked authentication providers including Facebook in this case rather than stored credentials. The combination of profile photograph with precise geographic coordinates, date of birth, and demographic information creates an unusually severe identification risk because affected users can be visually and contextually matched across multiple data points to specific addresses or neighborhoods.
For affected users, the practical risk profile is exceptionally severe given the sensitivity of the field set and the elevated romance-scam vulnerability of the affected demographic. The combination of profile photograph with precise GPS coordinates and lifestyle attributes supports targeted romance-scam, harassment, and extortion campaigns that may be particularly effective against the affected age demographic, which the U.S. Federal Trade Commission has identified as disproportionately victimized by romance scams. Affected users should be alert to unsolicited contact from individuals claiming to know personal details about their location, lifestyle, or dating history that may have been derived from the leaked dataset. Affected users who receive extortion attempts should not pay ransom demands because payment does not stop further extortion. Users should monitor financial accounts for unusual activity, treat any unsolicited romantic or financial-investment outreach with extreme caution, document any suspicious contact, and report extortion attempts to local law enforcement and the U.S. Federal Trade Commission at reportfraud.ftc.gov. Affected users who have concerns about romance scams should consult resources from AARP and the FTC, both of which maintain detailed guidance for older adults targeted by romance fraud.
About Senior Dating
Senior Dating (seniordating.com) was a niche dating platform targeting users aged forty and older, operated by an entity also responsible for Ladies.com, a lesbian dating platform. As an account-based niche dating service for older adults, Senior Dating maintained user account data including names, email addresses, dates of birth, profile photographs, biographical information, geographic location data with precise latitude and longitude coordinates, education levels, occupations, relationship statuses, drinking and smoking habits, and Facebook account linkages used for sign-in. The platform's user demographic concentrated in users in their 40s, 50s, 60s, and older, who represent a population that is independently identified by the U.S. Federal Trade Commission and other consumer-protection authorities as elevated-risk for romance-scam victimization.
Why They Hold Your Data
Senior dating platforms collect highly sensitive profile data, photos, messages, contact details, subscription records, and relationship preferences tied to matchmaking for older adults.
Recent Developments
Senior Dating was shut down in early December 2024 following the public disclosure of the Firebase database exposure. The shutdown also covered Ladies.com, the sister property operated by the same entity. The Senior Dating mobile application was removed from Google Play. The case has been widely cited in dating-platform cybersecurity coverage as illustrating the pattern of operator unresponsiveness to security disclosure. OSINT researcher Ryan Fae disclosed the vulnerability on X on December 3, 2024 after months of unresponsive communications with the operator. Earlier vulnerability disclosure attempts by independent researcher 'BobDaHacker' had also been received by the operator beginning in February 2024 (for Ladies.com) and April 2024 (for Senior Dating) but had not led to remediation. The breach was indexed by Have I Been Pwned on December 9, 2024.
Data Points Exposed
Exposure Categories
Canonical Fields
date_of_birth, education_information, email_address, gender, geographic_locations, job_information:occupation, lifestyle_habits:drinking, lifestyle_habits:smoking, profile_bio, profile_photo, relationship_status, social_media_profile
Dark Web Verification
- Dataset containing ~766K records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: Senior Dating Data Breach
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Senior Dating
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
