Women's Dating App Hacked

A controversial women’s dating safety app called TeaForWomen  Dating Advice, which is designed to let women anonymously ask, or warn each other, about men they can shared information about, and do a background check on, has been hacked. The hack has exposed tens of thousands of photos and other personal information.

The app lets women check whether potential partners are married or registered sex offenders as well as run reverse image searches to protect against "catfishing", where people use fake online identities. It has been previously recieved criticism from some  female users who claim it is anti-men. 

The women-only app with over one and half million users, says there had been "unauthorised access" to over 70K images submitted by women, exposing members' images, posts and comments. Many of the images are of women holding photo identification for verification purposes have been exposed, which Tea's own privacy policy promises are "deleted immediately" after authentication.

In a statement, Tea said "We have engaged third-party cyber security experts and are working around the clock to secure our systems." The incident highlights the fraught nature of seeking romance in the age of social media.

Tea has said that the breach has hit members who signed up before February 2024, and Tea has said it acted is working with the most trusted cyber security experts to resolve the problem. In an Apple Store review, one woman wrote that she used a Tea search to investigate a man she'd begun talking to and discovered “over 20 red flags, including serious allegations like assault and recording women without their consent.'' She said she cut off communication. 

One controversial aspects of Tea is that it allows women to share information on men they have dated to "avoid red flags" but also highlight those with "green flag" qualities. The company said the breached photos "can in no way be linked to posts within Tea". The firm blocks screenshots so that posts are not shared outside the app.

Tea has said that no email addresses or phone numbers were exposed, the company and the breach only affects users who signed up before February 2024. “At this time, there is no evidence to suggest that additional user data was affected. Protecting tea users’ privacy and data is our highest priority,” 

It also said that users did not need to change their passwords or delete their accounts. "All data has been secured." 

Tea was set up in November 2022 by Sean Cook, a software engineer who said he was inspired to create Tea after witnessing his mother's online dating experiences.

MalwareBytes   |   @ThePartyGirls  |   BBC    |   Yahoo    |     ABC News     |   USA Today |  Yahoo  |   PC Mag

Image: Leire Cavia

You Might Also Read: 

Online Daters Must Protect Themselves Against Fraud:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« Persistent Threats & The Growing Role Of AI In Cloud Security
How VPNs Open Up A World Of Streaming Entertainment »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Barracuda

Barracuda

Barracuda provides a comprehensive cybersecurity platform to protect organizations from all major attack vectors that are present in today’s complex threats.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.

Increase Your Skills (IYS)

Increase Your Skills (IYS)

Armed and ready: raise awareness of cyberattacks in your company with the Full-Service Awareness Platform from IYS – fast and effective. We help you develop a robust, sustainable security strategy.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.

iolite Secure

iolite Secure

iolite secures our nation’s infrastructure and critical assets through cyber threat detection, response, and mitigation.