Tea App Hack: On July 26, 2025, Tea, a dating app that allowed women to anonymously review men, confirmed hackers accessed roughly 72,000 images. Among these were approximately 13,000 selfies used for identity verification and 59,000 images shared in posts, comments, or messages. A spokesperson told Reuters that “unauthorised access to our systems” occurred, and that the breach affected only users who signed up before February 2024. The app said no emails or phone numbers were exposed.
Tea spokespersons said they have engaged third-party cybersecurity experts and are working around the clock to secure systems. The breach was first reported by 404 Media on the early morning of Friday, July 25.
Why This Breach Is Particularly Worrisome
Cybersecurity expert Jiten Jain, Director at Voyager Infosec, notes that this breach is especially alarming because attackers were able to map female users via GPS data. “This kind of data is a goldmine for digital stalkers, romance scammers, or threat actors who may use it for: blackmail, stalking, impersonation,” he warns. Such location-linked identity exposure vastly raises the risks.
How Can Someone Know If Their Data Was Breached?
Women concerned about exposure should input their email addresses into breach-tracking websites. These platforms verify whether the email or associated password has appeared in known data breaches.
How to Tell If Identity Theft Has Already Happened?
Signs include:
Bills that are lost or delivered late, leading to suspicion of a change in billing address.
Charges or bills for services which were not used.
Withdrawals or unexplained transactions in bank statements.
Unknown accounts appearing on credit reports.
Unexpected approval denials when applying for credit.
What Women Should Do If Their Data Was Exposed
Jain emphasises urgent and deliberate action. “Change all related passwords immediately: if the dating app used your email or social logins (like Google/Facebook), change those passwords first. Also, change any reused passwords on other apps or services to prevent credential stuffing.”
He further recommends: “Delete or deactivate the dating app profile: if the app hasn’t already been taken down, remove personally identifiable information, pictures, and deactivate or delete your profile.”
How To Minimise Risk After a Breach
Change Passwords
Change all of your passwords right away if you've reused them from site to site. An easy to guess password (which must include letters, numbers and symbols to be even somewhat challenging) just won't cut it. A password manager can help with creating and storing unique logins.
Sign Up for Two‑Factor Authentication
Enable two‑factor or multi‑factor authentication wherever possible. This adds a layer of security beyond passwords such as a one‑time code delivered via text or authenticator app making account access significantly harder for hackers.
Monitor Company Updates
Watch for alerts or guidance from the company responsible for the breach. For example, companies may log out affected users, issue notices, or provide remedial services such as credit monitoring.
Examine Your Financial and Credit Activity
Vigilance is critical. Review transaction histories and credit card statements regularly and obtain your annual credit reports from the major credit bureaus.
Consider Freezing Your Credit
Freezing credit prevents new credit accounts from being opened in your name. It can be lifted temporarily when needed. Although identity theft protection services exist, many steps can be performed independently.
Why This Matters
Tea marketed itself as a safe way for women to share experiences and warn others about potentially dangerous dates. But the breach especially its inclusion of GPS-linked selfies and verification IDs turns that trust into vulnerability. Tea’s model relied on anonymous reviews tied to visual proof. Now, many women must scramble to secure their identity.
To sums it up: change passwords, delete your profile, monitor compromised data and don’t underestimate the damage that can arise when location and identity images fall into malicious hands.