Lovora Breach: 496K Accounts Exposed
In February 2026, the couples and relationship app Lovora allegedly suffered a data breach that exposed 496k unique email addresses. The data also included users’ display names and profile photos, along with other personal information collected through use of the app. The app’s maker, Plantake, did ...
Overview
In February 2026, the couples and relationship app Lovora suffered a data breach that exposed 495,556 unique email addresses. The compromised data also included users’ display names, profile photos, and other personal information collected through the app. The breach was reported to Have I Been Pwned, allowing users to check if their accounts are affected. The app’s maker, Plantake, has not yet publicly confirmed the breach or disclosed how the data was compromised.
While email addresses and names are not as sensitive as passwords or financial data, their exposure in a relationship-focused app carries specific risks. The context of the app-storing intimate relationship data-could make victims targets for extortion or phishing attacks.
What Was Exposed
The breach primarily exposed:
- Email addresses (495,556 unique emails) – Can be used for spam, phishing, or credential-stuffing attempts.
- Display names – Could reveal real names or usernames used across platforms.
- Profile photos – May be used for social engineering, especially given the app’s romantic context.
- Other personal information – Not fully specified, but could include relationship status, preferences, or private messages.
The exposure of profile photos and relationship data elevates the risk beyond a typical credential dump. Attackers could harvest this data to build detailed dossiers on victims, potentially for blackmail or targeted harassment.
What to Do Right Now
-
Check if you’re affected – Visit Have I Been Pwned and enter your email address. If your account appears in the breach, proceed with the steps below.
-
Watch for targeted phishing – Attackers may send emails referencing your Lovora profile, pretending to be from Plantake or offering relationship advice. Do not click links in suspicious emails, and always verify before entering login credentials.
-
Review account activity – Log into your Lovora account and check for unauthorized changes to your profile, messages, or account settings. Change your password if you still use the same one.
-
Enable two-factor authentication (2FA) – If Lovora offers 2FA, activate it. This adds a layer of protection even if your email is exposed.
-
Be cautious on social media – Attackers might use your Lovora display name or profile photo to impersonate you, especially on dating or relationship platforms. Consider setting your social profiles to private temporarily.
How to Check If You’re Affected
Affected Lovora users can verify their exposure through Have I Been Pwned (HIBP), a free data breach notification service. Visit haveibeenpwned.com and enter the email address you used with Lovora. If the email is found in the breach, HIBP will display a warning and offer guidance. This is the safest way to check without entering your data into unverified third-party sites.
For broader security context, follow our cybersecurity news coverage to stay informed about similar breaches.
Security Insight
This breach reveals a concerning lack of transparency from Plantake. Rather than notifying users directly, victims discovered the incident only after the data appeared on Have I Been Pwned. In an app where users share intimate relationship details, the absence of a proactive disclosure suggests a broader weakness in security governance. Compared to similar breaches in the dating and relationship app space, such as the Adult Friend Finder leaks or Ashley Madison compromise, Lovora’s breach underscores a recurring pattern: apps that collect sensitive personal data often lack the incident response protocols needed to protect user trust.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, the ShinyHunters extortion group listed Vimeo on their extortion portal as part of their "pay or leak" campaign . They subsequently published hundreds of gigabytes of data, predominantly consisting of video titles, technical data and metadata. The data also included 119k unique email ...
In March 2026, the NSFW AI companion platform Cuties AI suffered a data breach that was subsequently published to a public hacking forum . The incident exposed 144k unique email addresses along with display names, avatars, prompts and descriptions used to generate AI adult images, as well as URLs to...
In March 2026, the League of Legends custom skins service Divine Skins suffered a data breach . The incident was disclosed via the service's Discord server, where Divine Skins stated that an unauthorised third party accessed part of its systems, deleted all skins from the database and exposed email ...
In early 2026, data purportedly sourced from the recipe and meal planning service Provecho was alleged to have been obtained in a breach. The exposed data included 713k unique email address along with username and the creator account holders followed. Provecho has been notified and is aware of the c...