Over 4 Million Private Records Leaked from LGBTQ+ Dating App Headero — Including GPS Locations and Sexual Preferences

A serious data breach has exposed over 4 million private records from Headero, a hookup app popular in queer and alternative dating communities.

Over 4 Million Private Records Leaked from LGBTQ+ Dating App Headero — Including GPS Locations and Sexual Preferences

A serious data breach has exposed over 4 million private records from Headero, a hookup app popular in queer and alternative dating communities. The leaked data includes users' exact GPS locations, sexual preferences, STD status, and explicit chat logs.


Key Highlights:

  • Cybernews researchers discovered a major data exposure from Headero.

  • The leak included:

    • 352,081 user records

    • 3,032,001 chat messages

    • 1,096,904 group chat room records

What Information Was Exposed?

  • Full names

  • Emails

  • Social login IDs

  • JWT tokens

  • Profile pictures

  • Device tokens

  • GPS coordinates

  • Sexual preferences

  • STD status

  • One-on-one and group chats

Why It’s Dangerous:

The most alarming part of the leak is the exposure of precise GPS locations, putting users—especially from vulnerable communities—at serious risk of stalking, harassment, or worse.

Headero is published by ThotExperiment, a US-based developer, and is available on the Google Play Store. The app provides location-based matching, direct messaging, and profile customization.


How the Company Responded:

Cybernews notified the app developers, who immediately secured the exposed database. However, no official public statement has been made. The company claimed the exposed instance was a test database, but Cybernews' analysis suggests it may have contained real user data.


❗ Not the First Time:

This isn’t the first case where dating apps—especially LGBTQ+, BDSM, and sugar dating platforms—have leaked private user data. Past breaches have exposed:

  • User-uploaded photos

  • Verification selfies

  • Deleted images

  • Private messages with sensitive media


What Should Headero Users Do Now?

If you’ve used Headero recently, take the following precautions:

  1. Monitor your inbox and phone – You may receive phishing emails or scam messages. Don’t click suspicious links.

  2. Change your passwords – Especially if you used the same one on multiple platforms.

  3. Review app permissions – Revoke unnecessary access from your phone’s settings.

  4. Stay vigilant – Watch out for fake profiles, unusual login activity, or unexpected messages.


  • This incident highlights how basic cybersecurity hygiene is still being neglected by some app developers—at great cost to user safety and privacy.