CRITICAL SEVERITYDating

Mate1.com Data Breach

Mate1 Dating Platform Breach (2016): 27 Million User Profiles Including Sexual Preferences, Religion & Drug Use Habits Exposed

Online dating platform.

Verified by ObscureIQ Intelligence

10.0Severity
27.4MRecords
25Fields
2016Year

ObscureIQ Breach Intelligence Scores
13.2
Breach Risk Index
40
Data Value
25
Market Recency
512
days
Since Breach

Risk Interpretation

Exposure enables stalking, harassment, phishing, and romance scams. Dating-profile and communication data can also support identity linkage and reputational harm.

🎯 Impact & Downstream Threats

The institutional impact on Mate1.com has been moderate given the platform's apparent unresponsiveness to the original breach disclosure and the limited public regulatory or civil-litigation activity relative to the breach's scale. The lack of acknowledgment and the documented persistence of plaintext-password storage represent a notable departure from contemporary industry breach-response practices. Reputational impact concentrated within the broader dating-platform sector, where the breach has

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Financial fraud using exposed financial profile data
  • Identity verification bypass using name + date of birth combination
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure
  • Employment-based social engineering using job and employer data

🔓 Threat Vectors

Behavioural profiling & blackmail
Identity verification bypass
Credential fraud & spear-phishing
Phishing, credential stuffing & account takeover
Discriminatory targeting & hate crime enablement
Loan fraud & targeted financial scams
Name-based social engineering
Profile enrichment
Pattern-of-life analysis & physical surveillance
Vishing & authority impersonation
Credential stuffing & account takeover
Physical description for fraud & imposture
Social engineering context
Detailed social engineering
Targeted harassment & discrimination
Blackmail & coercive extortion
Cross-platform tracking & credential stuffing

📋 Breach Intelligence

EntityMate1.com
Organization • Global
Breach Date2016-02-29
DBC Added2024-12-01
Added Date2024-12-01
Records~27.4M (27,389,929 records)
Attack VectorMisconfiguration
Threat ActorUnknown (sold on Hell forum for ~20 BTC)
Data SubjectsUser
Breach PathwayDirect
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityRestricted
Breach ID859;860
StatusConfirmed

📝 Executive Summary

Mate1.com, an international online dating site that claimed approximately 36.5 million users globally, suffered a data breach in approximately February 2016 when an attacker compromised Mate1.com's MySQL database server through what the attacker described as shell or command access to the server. The attacker subsequently posted an advertisement on the dark-web forum Hell offering the stolen data for sale at approximately 20 Bitcoin (approximately $8,700 at the time), and the data was confirmed to have been sold to at least one buyer. The hacker stated that the original dump contained approximately 40 million accounts and was reduced to approximately 27 million after the hacker removed bot accounts identified by a common password pattern. Mate1.com did not initially acknowledge the breach, and Motherboard's verification process confirmed that 498 of 500 sampled email addresses corresponded to actual Mate1.com accounts.

The breach affected approximately 27.4 million subscribers based on records indexed by Have I Been Pwned and DataBreach.com. Compromised fields included email addresses, names, usernames, dates of birth, gender, sexual fetishes, drug use habits, drinking habits, smoking habits, political views, religion, ethnicities, income levels, job titles, education levels, parenting plans, fitness levels, physical attributes, geographic locations, relationship statuses, personal descriptions, astrological signs, travel habits, work habits, website activity records, and passwords stored in plaintext. The plaintext password storage represents a critical security failure that exposes the original credential values directly to anyone with access to the dataset, with no cryptographic protection of any kind. Independent verification by Troy Hunt confirmed the plaintext-password storage by testing Mate1.com's password-reset feature, which emailed the user's actual plaintext password rather than triggering a reset.

For affected users, the practical risk profile is among the most severe in the dating-platform breach corpus because of the unusually broad and sensitive field set combined with plaintext password exposure. The combination of name, email, date of birth, geographic location, job title, income level, and political and religious views creates substantial identity-fraud, employment-targeting, and discrimination risk. The exposure of sexual fetishes, drug use habits, and political views creates targeted harassment, doxxing, and extortion risk that varies significantly across user populations. Affected users may face employment, relationship, and family consequences depending on which fields are most sensitive in their personal context. The plaintext password exposure means that any account where the user reused the Mate1.com password is fully compromised. Affected users who receive extortion attempts should not pay ransom demands because payment does not stop further extortion. Users should change all reused passwords immediately, enable two-factor authentication where available, document any extortion communications, and report extortion attempts to law enforcement. Because Mate1.com did not require email verification at account creation, individuals who find their email address in the dataset but who do not recall ever creating a Mate1.com account may have had their email used by another party to create an account, which is itself a risk worth investigating.

🏢 About Mate1.com

Mate1.com was a large international online dating site that operated under the mate1.com domain and claimed approximately 36.5 million users globally at the time of the 2016 breach. The platform operated as a general-interest dating service with extensive profile-attribute matching that captured a substantially broader range of personal-attribute fields than mainstream dating platforms, including sexual fetishes, drug use habits, drinking habits, political views, religion, ethnicity, income levels, education levels, job titles, parenting plans, fitness levels, physical attributes, astrological signs, and travel and work habits. The platform did not require email verification at account creation, which meant that the user database included a substantial proportion of fake or unverified accounts in a pattern similar to that documented at Ashley Madison.

Platform | Online dating and matchmaking | General dating platform | Global
Globalmate1.com

🗂 Why They Hold Your Data

Dating platforms collect profile data, photos, messages, account records, and subscription activity tied to online matchmaking workflows.

📰 Recent Developments

Mate1.com initially did not acknowledge the breach when it was disclosed on the dark-web forum Hell in late February 2016, with no public statement appearing on Mate1.com's website at the time of the original Motherboard reporting. Independent verification by Have I Been Pwned founder Troy Hunt and security researchers documented that Mate1.com continued to store user passwords in plaintext for months after the breach, with the password-reset functionality returning the user's actual plaintext password by email rather than triggering a password-reset workflow. The case has been widely cited in dating-platform cybersecurity coverage as illustrating systemic data-protection failures at large general-interest dating services in the post-Ashley Madison period and as one of the leading examples of the persistent plaintext-password storage pattern in the dating-platform sector. The breach was redistributed and indexed by DataBreach.com on November 30, 2024.

🔍 Data Points Exposed

25 verified field types:
Password
Email
Name;Astrological signs
Dates of birth
Drinking habits
Drug habits
Education levels
Email
Ethnicities
Fitness levels
Genders
Geographic locations
Income levels
Job titles
Names
Parenting plans
Passwords
Personal descriptions
Physical attributes
Political views
Relationship statuses
Religions
Sexual fetishes
Travel habits
Usernames
Website activity
Work habits

Exposure Categories

LocationGEO LOCS
FinancialFIN PROFILE
EmploymentJOB INFO

Canonical Fields

activity_history:website_activity, astrological_sign, date_of_birth, education_information, email_address, ethnicity_or_race:ethnicity, financial_profile:income, full_name, gender, geographic_locations, job_information:job_title, lifestyle_habits:drinking, lifestyle_habits:drug_use, parenting_preferences, password, physical_and_lifestyle_profile:fitness_level, physical_and_lifestyle_profile:physical_attributes, political_views, profile_bio:personal_description, relationship_status, religion, sexual_preferences, travel_information:travel_habit, username, work_habits

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~27.4M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: mate1.com-2016;Mate1.com Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Mate1.com
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationDatingEmailPasswordsFinancial DataDOB

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom