Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeThreat LibraryData Breaches
Grindr

Grindr Data Breach

Published: 10/31/2025

Written by: Monica Burgess

Glitch effectGlitch effect

The Grindr data breach revealed how the popular dating app was exposing highly sensitive user data, including HIV status and location information. While not a classic hack, this incident highlighted critical privacy flaws that allowed third-party companies to access personal details of millions of users, creating significant safety and privacy risks for its global community.

Grindr Data Breach Explained: What Happened?

The "breach" was less of a single hack and more of a series of privacy failures discovered in 2018. Researchers found that Grindr was sharing incredibly sensitive user information, including HIV status and test dates, with third-party vendors. Additionally, a separate flaw allowed anyone to pinpoint users' exact locations, a problem that had been known for years.

When Did the Grindr Data Breach Happen?

The privacy issues came to light in April 2018. Reports from media outlets and nonprofit organizations revealed that Grindr had been sharing sensitive health information with third-party service providers like Apptimize and Localytics. The location tracking vulnerability had been a known issue for several years prior to this.

Who Hacked Grindr?

The identities and motivations behind the Grindr data breach remain unknown. This incident wasn't a traditional cyberattack carried out by a specific threat actor. Instead, it was a case of inadequate data protection policies and API vulnerabilities within the Grindr application that allowed third parties and potentially malicious individuals to access sensitive user data.

How Did the Grindr Breach Happen?

The data exposure stemmed from two main issues. First, Grindr intentionally shared sensitive user data, such as HIV status, with third-party vendors for app optimization. This data was bundled with other personally identifiable information. Second, a significant API vulnerability allowed anyone with basic technical skills to access precise user location data, even if a user had opted out of sharing their location publicly.

Grindr Data Breach Timeline

  • 2014-2016: Security researchers and journalists report on vulnerabilities that allow for the precise triangulation of Grindr users' locations.

  • Early 2018: Grindr is found to be sharing users' HIV status and last tested date with third-party analytics companies, Apptimize and Localytics.

  • April 2, 2018: BuzzFeed News and SINTEF publicly report on the data sharing practices, sparking public outcry.

  • April 2, 2018: In response to the backlash, Grindr announces it will stop sharing HIV status information with third-party vendors.

  • April 2018: Senator Edward Markey sends a letter to Grindr demanding answers about its data sharing policies and security practices.

  • September 2018: Grindr releases an update that gives users more control over their data but doesn't fully resolve the location tracking vulnerability.

Technical Details

The primary technical failure was in how Grindr's API handled location data. The API transmitted user distances from a queried point with un-rounded figures, which allowed for trilateration. An attacker could make three or more requests from different spoofed locations to calculate a target user's precise coordinates. The sharing of HIV status was not a technical flaw but a policy decision to send sensitive data packets to third-party SDKs embedded in the app.

Indicators of Compromise (IoCs)

As this was not a malware-based attack, there are no traditional Indicators of Compromise like file hashes or malicious IP addresses associated with the incident. The compromise was a result of API vulnerabilities and data handling policies.

Forensic and Incident Investigation

Investigations were primarily conducted by external security researchers, journalists, and advocacy groups. There were no public reports of an internal forensic investigation by Grindr. The company's response focused on changing its data-sharing policies and issuing public statements rather than detailing a technical incident response, largely because the exposures were part of the app's design.

What Data Was Compromised in the Grindr Breach?

The exposed data was extremely sensitive and included:

  • Health Information: HIV status and the date of the user's last HIV test.

  • Personally Identifiable Information (PII): User profile details which could include age, ethnicity, "tribe" (community), and photos.

  • Geolocation Data: Precise, real-time user location, even for users who disabled location sharing on their profiles.

  • Device Information: GPS data, phone ID, and WiFi access point.

How Many People Were Affected by the Grindr Data Breach?

Grindr has not confirmed how many individuals were affected by the breach. However, at the time of the incident in 2018, the app had approximately 3.6 million daily active users, all of whom were potentially exposed to the location tracking vulnerability and data sharing practices.

Was My Data Exposed in the Grindr Breach?

There is no tool to check if your specific data was accessed. Given the nature of the vulnerability, it's safest to assume that if you were an active Grindr user before the policy changes in mid-2018, your location and profile data were exposed. All users who voluntarily provided their HIV status had that information shared with third parties.

Key Impacts of the Grindr Breach

The fallout from Grindr's privacy failures was significant.

  • Reputational Damage: The company faced a massive public backlash, eroding user trust. The incident cemented Grindr's reputation for having poor privacy protections.

  • User Safety Risks: The exposure of location and HIV status put users at risk of stalking, harassment, physical harm, and public outing, especially in countries where homosexuality is criminalized.

  • Regulatory Scrutiny: The breach drew the attention of lawmakers and regulators, leading to official inquiries and calls for stricter data privacy laws governing dating apps.

Response to the Grindr Data Breach

Following intense media pressure and public outrage, Grindr's response was swift but criticized as reactive. The company's security chief stated that sharing data with partners like Apptimize and Localytics was "standard industry practice" but acknowledged that user trust was paramount. Grindr quickly announced it would stop sharing users' HIV information with third parties and later made some updates to obscure location data.

Lessons from the Grindr Data Breach

This incident is a masterclass in what not to do with sensitive user data.

  • Privacy by Design is Non-Negotiable: Security and privacy can't be afterthoughts. They must be built into an application's architecture from the ground up.

  • Understand Your Data: Companies must know what data they collect, why they collect it, and who it's shared with. Sharing sensitive health information for analytics is a massive overstep.

  • Vulnerability Management Matters: The location-tracking flaw was known for years before it blew up into a major scandal. Ignoring known vulnerabilities is a recipe for disaster. Fix your stuff!

Is Grindr Safe after the Breach?

Grindr has taken steps to improve its security and privacy practices since 2018. The company no longer shares HIV status with third-party vendors and has implemented measures to obscure exact user locations. However, like any social app, risks remain. Users should always be cautious about what information they share on their profiles and be aware that no platform is 100% secure.

Mitigation & Prevention Strategies

Protecting your organization from data exposure incidents—whether from internal policy gaps or external attacks—requires a proactive stance. Here’s what you can do:

  • Implement Zero Trust: Never trust, always verify. Assume any user or device could be compromised and require strict verification for every access request.

  • Data Classification: Know what data you have and classify it based on sensitivity. You can't protect what you don't know you have.

  • Vendor Risk Management: Before you partner with a third-party vendor, vet their security practices. You are responsible for the data they handle on your behalf.

  • Continuous Monitoring: Use security tools to maintain visibility across your environment. You need to be able to detect and respond to threats quickly. 24/7 monitoring is key.

Related Data Breach Incidents

  • MOVEit Data Breach

  • Okta Data Breach

  • MGM Data Breach

Grindr Data Breach FAQs

The Grindr breach was caused by poor data privacy practices and an API vulnerability. The company shared sensitive user information, like HIV status, with third-party vendors. A separate flaw in its API allowed attackers to pinpoint the precise physical location of users.

Extremely sensitive data was exposed, including users' HIV status, last test dates, and precise geolocation. Other personally identifiable information from user profiles, such as photos, age, and ethnicity, was also accessible.

No specific hacking group was responsible. The data exposure was a result of Grindr's own internal policies and application vulnerabilities. The "attackers" were security researchers and potentially malicious individuals who could exploit these publicly known flaws.

Businesses can prevent similar incidents by adopting a "privacy by design" approach, ensuring security is part of the development lifecycle. This includes rigorously vetting third-party vendors, classifying and protecting sensitive data, and fixing known vulnerabilities promptly. Don’t share data you don’t absolutely need to.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy