
BLOG
BLOG
In July 2025, Tea Dating Advice—an app designed to help women vet dating partners—was thrust into the spotlight after a catastrophic data breach.
International publications, including BBC, NPR, and The New York Times, reported that over 72,000 user images and 1.1 million private messages were leaked, exposing deeply sensitive information about more than 1.6 million users. The breach affected users who joined before February 2024 due to a failure to migrate legacy data to secure storage.
But a technical investigation of the app (Tea for Women iOS v2.5.4) by Appknox revealed more: the incident was not merely a legacy storage oversight, but a symptom of structural security weaknesses that are disturbingly common across the mobile app ecosystem.
After scanning Tea for Women iOS v2.5.4, we identified four critical security gaps that threaten not only Tea users but also users of countless similar apps worldwide:
What we found: API keys and client tokens were embedded directly in the app's source code.
Impact: Attackers can extract these keys and impersonate the app, abuse backend APIs, and potentially access user data — all without triggering standard authentication controls.
Industry view: Hardcoded secrets are a leading cause of large-scale unauthorized access, as confirmed by the 2025 ThreatLabz report and multiple security advisories.
What we found: The app has no mechanism to detect if it's running on a jailbroken (compromised) iOS device.
Impact: Jailbroken devices bypass iOS security protections. Attackers can reverse-engineer the app, extract sensitive data, or tamper with app behavior silently.
Why this matters: While unlikely to cause a large-scale breach alone, this increases the risk of targeted user exploitation.
What we found: While the app uses HTTPS, it does not enforce SSL pinning.
Impact: Attackers on public Wi-Fi could intercept traffic using man-in-the-middle (MITM) techniques and read or alter personal data.
Why this matters: This could enable future attacks, even if not directly involved in the recent breach.
What we found: The app lacks runtime defenses — no hooking, debugging, or tampering detection.
Impact: This allows attackers to alter app behavior in real time or create fraudulent versions of the app.
Why this matters: This significantly weakens the app’s overall resilience, especially in sensitive categories like dating or fintech.
The breach exposed thousands of images (including driver’s licenses used for verification) and direct messages containing personal, legal, and health information.
Security expert Ted Miracco noted, “Tea was not following basic cybersecurity practices,” and data was “stored in such an insecure way… that they have been exposed in multiple data breaches within the last week.”
This “worst-case scenario” led to legal actions and public backlash, with experts warning the incident may trigger new scrutiny of app security across the dating, health, and social categories.
“Hardcoded secrets in production apps are time bombs. Combine that with runtime insecurity and you’ve got a breach waiting to happen.”
— Raghunandan J, Head of Product & R&D, Appknox
Among the gaps we identified, hardcoded secrets stand out as the most plausible cause. The other issues don’t directly explain the breach, but they make it far easier for attackers to test, exploit, and repeat.
Here is how to move from reactive to proactive mobile security:
The Tea breach is more than a one-off failure — it's a sign of what happens when mobile app security is sidelined. With consumer trust on the line, especially in high-risk categories, secure mobile development must start from day one.
Prevention, not post-facto response, must become the standard for anyone handling sensitive user data. Secure your mobile apps today to avoid tomorrow’s headlines.
In mobile security, prevention isn’t optional. It’s survival.
Need help securing your app?
Learn more at www.appknox.com or contact us for a free scan.