HIGH SEVERITYDating

LovePlanet Data Breach

LovePlanet Russian Dating Platform Breach (2015): 20 Million User Accounts Including Passwords Exposed

Russian online dating platform.

Verified by ObscureIQ Intelligence

7.5Severity
20.1MRecords
2Fields
2015Year

ObscureIQ Breach Intelligence Scores
10.0
Breach Risk Index
25
Data Value
25
Market Recency
447
days
Since Breach

Risk Interpretation

Exposure enables harassment, stalking, romance scams, and identity linkage around intimate social behavior. Social and message history can also deepen reputational risk.

🎯 Impact & Downstream Threats

The institutional impact on LovePlanet has been limited based on publicly available information, in part because the platform operates primarily in Russia and adjacent CIS markets where breach-notification and regulatory frameworks differ substantially from those in the United States and European Union. LovePlanet has not publicly acknowledged the breach. The reputational impact concentrated within the Russian and CIS dating-platform sector, although the breach has been broadly cited in internat

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Credential stuffing & account takeover

📋 Breach Intelligence

EntityLovePlanet
Organization • Global
Breach Date2015-01-01
DBC Added2025-02-04
Added Date2025-02-04
Records~20.1M (20,077,733 records)
Attack VectorUnknown
Threat ActorGnosticPlayers
Data SubjectsUser
Breach PathwayDirect
SourceDataBreach.com / ObscureIQ
SensitivityElevated
Breach ID819.0
StatusConfirmed

📝 Executive Summary

LovePlanet, a Russian online dating platform serving users in Russia, Ukraine, and Belarus, suffered a data breach in approximately January 2015 when attackers exploited security flaws in LovePlanet's systems and exfiltrated a database containing personal information and credentials for approximately 20.1 million users. The breach has been attributed to the GnosticPlayers hacker group, which was responsible for a series of high-profile breaches at dating, consumer, and social platforms during the 2014 to 2019 period. The breach data was originally distributed on RaidForums, the dark-web breach-trading forum that was subsequently seized by law enforcement, before broader redistribution. DataBreach.com indexed the breach on February 3-4, 2025, approximately ten years after the original incident.

The breach affected approximately 20,077,733 unique user accounts based on records indexed by breach-tracking services. Compromised fields included usernames, email addresses, and passwords stored in plaintext. The plaintext password storage represents a critical security failure that exposes the original credential values directly, with no cryptographic protection of any kind. The breach was originally posted under the description 'loveplanet.ru 20m users plaintext' on RaidForums.

For affected users, the practical risk profile combines credential-reuse exposure with niche dating-platform-specific reputational risk in Russian and CIS markets. The plaintext password exposure means that any account where the user reused the LovePlanet password is fully compromised, with credential-stuffing risks expected on email, social media, financial, and other accounts where Russian and CIS users may have used the same password. The combination of email address, username, and confirmed dating-platform membership supports targeted phishing referencing the platform or related services. Inclusion in the dataset confirms a dating-platform relationship that may carry reputational consequences depending on the user's circumstances. Affected users who receive extortion attempts should not pay ransom demands because payment does not stop further extortion. Users should change all reused passwords immediately, enable two-factor authentication where available, document any extortion communications, and report extortion attempts to law enforcement. The ten-year gap between the original breach and the recent redistribution means that affected users should expect long-term exposure rather than a time-limited incident, with the dataset likely to remain in circulation indefinitely.

🏢 About LovePlanet

LovePlanet (loveplanet.ru) is a Russian online dating platform that serves users primarily in Russia, Ukraine, and Belarus, with approximately 22 million users at the time of public reporting on the breach. The platform operates a freemium model with both free account access and premium subscription tiers, and supports both heterosexual and same-sex matchmaking with search by country, city, age, gender, and physical attributes. LovePlanet has been the subject of consumer reviews questioning the legitimacy of profiles on the platform, with multiple reviewers alleging that the platform contains a substantial proportion of bot or operator-created profiles in a pattern similar to other large dating platforms. As an account-based dating platform, LovePlanet maintains user account data including identity, contact information, and login credentials.

Platform | Online dating and matchmaking | General dating platform | Global
Globalloveplanet.ru

🗂 Why They Hold Your Data

Dating platforms collect profile data, photos, messages, social activity, and subscription records tied to online matchmaking and relationship discovery.

📰 Recent Developments

The LovePlanet breach was publicly indexed by DataBreach.com on February 3-4, 2025, approximately ten years after the original 2015 incident, as part of the broader 2024 to 2025 wave of historical dating-platform breach redistribution and indexing. The breach has been attributed by DataBreach.com and other breach-tracking publications to the GnosticPlayers hacker group, which was responsible for a series of dating-platform and consumer-platform breaches during the 2014 to 2019 period. LovePlanet itself does not appear to have publicly acknowledged the breach, and the platform reportedly continues to operate. The breach was originally distributed on RaidForums (now defunct following law enforcement seizure) before broader redistribution.

🔍 Data Points Exposed

2 verified field types:
Password
Email

Canonical Fields

email_address, password

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~20.1M records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: love-planet-2015

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of LovePlanet
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

DatingEmailPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom