According to a recent listing discovered by cybersecurity analysts, a threat actor on the dark web is allegedly selling root access and database backups for a popular South Korean dating app with over one million users.
The seller claims to possess critical infrastructure access, including root shell privileges, hard-coded credentials, and full database backups containing sensitive user data.
Priced at $10,000 (negotiable), the listing follows dark web norms by requiring proof of funds before disclosing the app’s name or providing evidence of access26.
This incident highlights escalating cybersecurity risks in South Korea’s digital dating landscape, which has previously faced large-scale breaches like the 2019 Coffee Meets Bagel compromise affecting six million users.
Breach Details and Seller’s Offer
According to the post from cyberundergroundfeed, the dark web listing promises “full administrative control” over the app’s servers, enabling buyers to manipulate user accounts, payment systems, and backend infrastructure.

Database backups reportedly include personally identifiable information (PII), messaging histories, and payment details—data that could fuel identity theft, phishing campaigns, or financial fraud.
The seller’s emphasis on “hard-coded credentials” suggests the app’s developers may have embedded sensitive access keys directly into its source code, a practice cybersecurity experts widely criticize as a critical vulnerability.
This mirrors past incidents, such as the 2020 Zoom account breach, where 500,000 credentials were sold for less than $0.01 each on similar platforms.
Risks for Users and Platform Integrity
If legitimate, this breach exposes users to heightened risks of stalking, blackmail, and financial exploitation.
Dating platforms often store deeply personal information, including preferences, location data, and private messages, which malicious actors could weaponize.
For the app itself, unauthorized root access could enable service disruption, data manipulation, or ransomware attacks.
The $10,000 price tag aligns with dark web trends observed in travel and retail fraud markets, where stolen flight tickets and gift card generators are sold at 30% of their retail value.
Cybersecurity firm Rapid7 notes that dark web markets increasingly target e-commerce and social platforms due to their vast repositories of monetizable data.
South Korea’s Cybersecurity Challenges
South Korea has grappled with dark web-related crimes for years, including the 2019 “Welcome to Video” case—the largest child pornography site ever dismantled, operated by a South Korean national.
While authorities have expanded cybercrime units and international collaborations since then, persistent challenges include cryptocurrency-enabled anonymity and sophisticated laundering tools like coin mixers.
The country’s dark web user base tripled between 2016 and 2019, with platforms frequently trading stolen credit card details, counterfeit currency, and hacking tools.
Legal hurdles remain, as penalties for data breaches and digital fraud often lag behind global standards.
For instance, the Welcome to Video operator received only an 18-month sentence in South Korea, compared to 15-year terms for U.S.-based users.
This latest incident underscores the urgent need for enhanced encryption practices, proactive dark web monitoring, and stricter penalties for cybercrime.
Users of affected platforms are advised to enable multi-factor authentication, monitor accounts for suspicious activity, and avoid reusing passwords across services.
Also Read: