Tea App Breach Exposed 72,000 Selfies & IDs: Urgent Lessons for Mobile API Security
Update: 2025-08-04
Description
Mobile-First Security: The Urgent Lessons from the Tea App Breach
In this focused segment of Upwardly Mobile, we unpack the recent Tea app breach, a sobering case study that highlights the critical need for a robust mobile-first cybersecurity strategy and proper API security. The Tea app, a women's dating safety application that rapidly climbed to the top of the free iOS App Store listings and reached the No. 1 spot on Apple's US App Store, claiming over 1.6 million users, was designed to allow women to exchange information about men to enhance safety. A key feature involved new users verifying their identity by uploading a selfie. The company confirmed a major security breach, stating they had "identified authorized access to one of our systems". Preliminary findings revealed access to approximately 72,000 user images. This alarming exposure included:
This content was created in partnership and with the help of Artificial Intelligence AI
In this focused segment of Upwardly Mobile, we unpack the recent Tea app breach, a sobering case study that highlights the critical need for a robust mobile-first cybersecurity strategy and proper API security. The Tea app, a women's dating safety application that rapidly climbed to the top of the free iOS App Store listings and reached the No. 1 spot on Apple's US App Store, claiming over 1.6 million users, was designed to allow women to exchange information about men to enhance safety. A key feature involved new users verifying their identity by uploading a selfie. The company confirmed a major security breach, stating they had "identified authorized access to one of our systems". Preliminary findings revealed access to approximately 72,000 user images. This alarming exposure included:
- 13,000 images of selfies and photo identification documents, such as driver's licenses, which users had submitted during the account verification process.
- 59,000 publicly viewable images from posts, comments, and direct messages within the app.
- Broken access controls. (BOLA)
- Weak authentication.
- Missing transport protections.
- Absent runtime safeguards.
This content was created in partnership and with the help of Artificial Intelligence AI
Comments
In Channel