A significant security breach has revealed that nearly 1.5 million personal images from kink and LGBT dating apps were stored online without proper protection. The lapse, identified by ethical hackers, raises urgent questions about user safety and the handling of sensitive data by app developers.
Major Security Flaw Exposes 1.5 Million Private Images from Kink and LGBT Dating Apps

Major Security Flaw Exposes 1.5 Million Private Images from Kink and LGBT Dating Apps
Vulnerable user photos from five dating apps reveal serious security lapses, sparking concerns over user safety and privacy.
Researchers have uncovered a grave security breach affecting nearly 1.5 million private user images linked to five specialist dating apps, including kink site BDSM People and sugar daddy platform Chica. These intimate and often explicit images were discovered stored online without password protection, exposing them to potential hackers and extortionists. The applications are utilized by an estimated 800,000 to 900,000 users.
The security vulnerability was initially flagged to M.A.D Mobile, the developer behind these apps, on January 20, but it wasn’t until the BBC conducted its investigation that corrective action was taken. The company has since patched the loophole, yet it has remained silent on how the breach occurred, raising concerns about the adequacy of their security protocols.
Ethical hacker Aras Nazarovas from Cybernews was the first to report the revelation of the unprotected stash of sensitive images. By dissecting the application code, he located the unsecured online storage and gained access to unencrypted photographs, which he identified as concerningly vulnerable. "The first app I probed was BDSM People, and the very first image I encountered was a naked man in his thirties," he conveyed, noting the shocking ease with which he accessed the illegal material.
The implications of this breach are severe, especially for those utilizing these apps in countries where LGBT rights are under threat. Nazarovas warned that malicious actors could exploit these images to extort individuals. While the sensitive images lack identifying user information, which could complicate targeted attacks, the possibility of abuse remains high.
In a statement, a M.A.D Mobile representative acknowledged their gratitude for the identification of the security flaw, emphasizing that subsequent steps had been taken to shield users from a potential data breach. However, the lack of clarity regarding the developer’s location and their delayed response despite earlier warnings from cybersecurity professionals continues to draw scrutiny.
Typically, security experts hold off on making vulnerabilities public until they are addressed to prevent exacerbating risk levels for users. Yet, concerned for user safety, Nazarovas and his team chose to notify the public mid-investigation. "It's always a difficult decision, but we think the public need to know to protect themselves," he asserted.
The vulnerability echoes a significant incident from 2015 when hackers stole extensive customer data from Ashley Madison, a dating site tailored for married individuals seeking extramarital affairs. Such recurring security breaches spotlight the urgent need for improved data protection measures across dating platforms.