Fling Data Breach
Fling Adult Dating Platform Breach (2011): 40 Million User Accounts Including Sexual Orientation & Preferences Exposed
Online dating platform focused on casual relationships.
Risk Interpretation
Very high sensitivity. Exposure enables extortion, reputational harm, harassment, and identity linkage around adult dating behavior and sexual interests.
Impact & Downstream Threats
The 2011 breach exposed approximately 40 million accounts including email addresses, dates of birth, genders, geographic locations, IP addresses, passwords, phone numbers, sexual orientations, and website activity histories. The sexual orientation field — combined with the adult dating platform context — is what places this record in the restricted tier. The breach did not surface publicly until years after the incident, following the pattern of major early-2010s credential databases that circul
- Credential stuffing against reused passwords across other platforms
- SIM swap attacks where phone numbers are present
- Targeted phishing campaigns using exposed email addresses
- Doxxing risk from physical address exposure
Threat Vectors
Breach Intelligence
Executive Summary
Fling, an adult-oriented hookup and casual dating platform, was breached by an unknown attacker in 2011, exposing over 40 million user accounts. The method of intrusion has not been publicly disclosed. The breach did not surface widely until years after the incident, following a pattern common among early-2010s credential databases that circulated privately before becoming broadly known. The exposed data is unusually sensitive. Records included email addresses, passwords stored in plain text, dates of birth, phone numbers, geographic locations, IP addresses, genders, usernames, website activity histories, sexual orientations, and sexual fetishes. The combination of explicit sexual profile data with a hookup platform context creates serious risk of extortion, outing, and targeted harassment. Affected individuals may never have expected this information to leave the platform, and many may not know it was exposed at all. No settlement or regulatory action specific to this breach has been publicly documented. Affected users face lasting exposure: plain-text passwords can enable account takeovers across other services if reused, and the sexual profile data can be used to coerce or embarrass individuals years after the breach occurred. Anyone who used Fling around or before 2011 should treat their credentials as compromised and consider the possibility that their sexual identity information is in circulation.
About Fling
Fling is an adult-oriented social network and casual dating platform marketed around hookup and short-term relationship facilitation. The platform has operated for many years as a smaller competitor in the adult dating market alongside services like Adult FriendFinder. It collects detailed personal and sexual profile information as part of its user registration and matching process.
Why They Hold Your Data
Adult-oriented dating platforms collect highly sensitive profile data, emails, messages, sexual-interest signals, photos, and account activity tied to casual or explicit relationship seeking.
Recent Developments
Fling has maintained a low public profile with no major organizational changes or ownership announcements prominently documented in recent years. The platform continues to operate as a niche adult dating service.
Data Points Exposed
Exposure Categories
Canonical Fields
activity_history:website_activity, date_of_birth, email_address, gender, geographic_locations, ip_address, password, phone_number, sexual_orientation, sexual_preferences, username
Dark Web Verification
- Dataset containing ~40.8M records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: fling.com-2011;Fling Data Breach
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Fling
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
