HIGH SEVERITYDating

Ladies.com Data Breach

Ladies.com Lesbian Dating Platform Breach (2024): 119K User Profiles Including Sexual Orientation, Photos & Location Exposed via Firebase

Online dating platform focused on lesbian matchmaking and social connections.

Verified by ObscureIQ Intelligence

6.0Severity
119KRecords
15Fields
2024Year

ObscureIQ Breach Intelligence Scores
13.2
Breach Risk Index
40
Data Value
25
Market Recency
504
days
Since Breach

Risk Interpretation

Exposure enables harassment, stalking, phishing, and identity linkage. Dating-platform affiliation can also create reputational harm depending on the user’s circumstances.

🎯 Impact & Downstream Threats

The institutional impact on Ladies.com and the broader operator was effectively terminal. Both Ladies.com and Senior Dating were shut down following the December 2024 disclosure, and the case has been widely cited in cybersecurity coverage as illustrating systemic data-protection failures at small dating-platform operators. The reputational impact concentrated within the LGBTQ+-platform and niche-dating sectors, where Ladies.com was one of several lesbian-focused dating platforms. The operator d

Primary downstream threats:
  • Targeted phishing campaigns using exposed email addresses
  • Doxxing risk from physical address exposure

🔓 Threat Vectors

Identity verification bypass
Credential fraud & spear-phishing
Phishing, credential stuffing & account takeover
Household targeting
Profile enrichment
Pattern-of-life analysis & physical surveillance
Insurance discrimination & targeting
Social engineering context
Deepfake & identity document fraud
Facial recognition & physical identification
Outing, blackmail & targeted violence
Cross-platform tracking & credential stuffing

📋 Breach Intelligence

EntityLadies.com
Organization • Global
Breach Date2024-07-01
HIBP Added2024-12-09
Records~119K (118,800 records)
Attack VectorMisconfiguration
Threat Actorn/a (Firebase misconfiguration; same researchers as Senior Dating)
SourceHave I Been Pwned / ObscureIQ
SensitivityRestricted
Breach ID761.0
StatusConfirmed

📝 Executive Summary

Ladies.com, a niche lesbian dating platform, suffered a data breach due to an exposed Firebase database that had been left publicly accessible without proper authentication or access-control configuration since approximately February 2024 or earlier. The vulnerability was independently identified by security researcher 'BobDaHacker' who reported it to the platform operator beginning February 25, 2024, but the operator did not remediate the vulnerability for approximately nine and a half months despite the disclosure attempts. OSINT researcher Ryan Fae publicly disclosed the vulnerability on X on December 3, 2024 with details indicating the scope of the exposure across Ladies.com and the operator's sister platform Senior Dating, which prompted the operator to acknowledge the breach and shut down both platforms on approximately December 4, 2024. The breach was indexed by Have I Been Pwned on December 9, 2024.

The breach affected approximately 118,800 users on Ladies.com based on records indexed by breach-tracking services, alongside approximately 765,517 users on Senior Dating for a combined disclosure of approximately 917,000 users across the operator's two platforms. Compromised fields included email addresses, full names, usernames, dates of birth, profile photographs and additional photographs, biographical information, geographic location data with precise latitude and longitude coordinates, sexual orientation, gender, education levels, family structure, relationship statuses, drinking and smoking habits, and tattoo status. The dataset did not include passwords because Firebase authentication is typically managed through linked authentication providers including Facebook rather than through stored credentials. The combination of profile photograph with precise geographic coordinates, sexual orientation, and demographic information creates an exceptionally severe identification and outing risk because affected users can be visually and contextually matched across multiple data points to specific addresses or neighborhoods, with sexual orientation as an explicitly disclosed field rather than an inferred attribute.

For affected users, the practical risk profile is exceptionally severe given the LGBTQ+-specific sensitivity of the field set and the precision of the geographic data. The combination of profile photograph with precise GPS coordinates and explicit sexual orientation disclosure creates targeted outing, harassment, blackmail, and physical-safety risk that may be particularly severe for users in family, employment, or jurisdictional environments hostile to LGBTQ+ identity, including users in U.S. states or other jurisdictions with limited LGBTQ+ legal protections, users in religious or family communities where outing carries significant consequences, and users whose employment status could be affected by outing. Affected users who receive extortion or outing-threat attempts should not pay ransom demands because payment does not stop further extortion. Users should document any threatening communications, treat all unsolicited contact referencing Ladies.com or related platforms with extreme caution, and report extortion attempts to local law enforcement. LGBTQ+ users with personal-safety concerns may benefit from contacting LGBTQ+ advocacy organizations including the Trevor Project (1-866-488-7386) and GLAAD's safety resources for confidential support. Affected users in violent-relationship situations may also benefit from contacting the U.S. National Domestic Violence Hotline (1-800-799-7233).

🏢 About Ladies.com

Ladies.com was a niche dating platform focused on lesbian matchmaking and social connections, operated by an entity also responsible for Senior Dating (a 40+ general dating platform). As an account-based niche dating service for the lesbian community, Ladies.com maintained user account data including names, email addresses, usernames, dates of birth, profile photographs, biographical information, geographic location data with precise latitude and longitude coordinates, sexual orientation, gender, education levels, family structure, relationship statuses, drinking and smoking habits, tattoo status, and other lifestyle attributes used for matchmaking. The platform's user demographic concentrated in lesbian and queer women, a population for whom dating-platform identification carries materially different risk profiles than for general dating-platform users because of LGBTQ+-specific privacy, safety, and family considerations.

Platform | Online dating and matchmaking | General dating platform | Global
Globalladies.com

🗂 Why They Hold Your Data

Dating platforms collect highly sensitive profile data, photos, messages, subscription records, and relationship-intent information tied to matchmaking and social interaction.

📰 Recent Developments

Ladies.com was shut down on approximately December 4, 2024 following the public disclosure of the Firebase database exposure, and the website is no longer operational. The shutdown also covered Senior Dating, the sister property operated by the same entity. Independent researcher 'BobDaHacker' attempted to disclose the Firebase vulnerability to the operator beginning February 25, 2024, approximately nine months before the public disclosure forced operator action. The case has been widely cited in LGBTQ+-platform cybersecurity coverage as illustrating the elevated risk profile of LGBTQ+ dating-platform exposure and the consequences of operator unresponsiveness to security disclosure. The breach was indexed by Have I Been Pwned on December 9, 2024.

🔍 Data Points Exposed

15 verified field types:
Bios
Dates of birth
Drinking habits
Education levels
Email
Family structure
Genders
Geographic locations
Photos
Profile photos
Relationship statuses
Sexual orientations
Smoking habits
Tattoo status
Usernames

Exposure Categories

LocationGEO LOCS

Canonical Fields

date_of_birth, education_information, email_address, family_structure, gender, geographic_locations, lifestyle_habits:drinking, lifestyle_habits:smoking, physical_and_lifestyle_profile:tattoo_status, profile_bio, profile_photo, profile_photo:general_photo, relationship_status, sexual_orientation, username

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~119K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: Ladies.com Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Ladies.com
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationDatingEmailDOB

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom