{"id":226123,"date":"2026-01-30T03:00:42","date_gmt":"2026-01-30T11:00:42","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=226123"},"modified":"2026-01-29T17:50:38","modified_gmt":"2026-01-30T01:50:38","slug":"scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/","title":{"rendered":"This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion"},"content":{"rendered":"<p><span data-contrast=\"auto\">This week in\u00a0scams, three headlines tell the same story: attackers are getting better at manipulating people, not just breaking into systems.\u00a0We\u2019re\u00a0seeing a wave of intrusions tied to social engineering, a major delivery platform confirming a breach amid extortion claims, and a big tech headline that has a lot of people rethinking how apps handle their data.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Every week, this roundup breaks down the\u00a0scam\u00a0and cybersecurity stories making news and explains how they\u00a0actually work, so you can spot risk earlier and avoid getting pulled into someone else\u2019s playbook.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Let\u2019s\u00a0get into it.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">A Wave of Cyberattacks Hits Bumble, Match, Panera, and CrunchBase<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">The big picture:\u00a0<\/span><\/b><span data-contrast=\"auto\">Several major brands were hit by cybersecurity incidents tied to social engineering tactics like phishing and vishing.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">What happened:\u00a0<\/span><\/b><a href=\"https:\/\/nam10.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.bloomberg.com%2Fnews%2Farticles%2F2026-01-28%2Fbumble-panera-bread-crunchbase-match-hit-by-cyberattacks%3Fsrnd%3Dphx-technology&amp;data=05%7C02%7Cbrooke_seipel1%40mcafee.com%7Ce26de568a87f4b4ba0df08de5f30b02b%7C4943e38c6dd4428c886d24932bc2d5de%7C1%7C0%7C639052859918532325%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=5NgKDKB67Qk7KmopgWjLYk5m%2FKxlxF2EuC5TUdvLGwU%3D&amp;reserved=0\"><span data-contrast=\"none\">Bloomberg reported<\/span><\/a><span data-contrast=\"auto\">\u00a0that Bumble, Match Group, Panera Bread, and CrunchBase each confirmed incidents.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Bumble said a contractor account was compromised in a phishing incident, which led to brief unauthorized access to a small\u00a0portion\u00a0of its network, and said its member database, accounts, messages, and profiles were not accessed.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Panera said an attacker accessed a software application it used to store data, and said the data involved was contact information.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Match said the incident affected a limited amount of user data, and said it saw no\u00a0indication\u00a0that user logins, financial information, or private communications were accessed.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">CrunchBase said documents on its corporate network were\u00a0impacted,\u00a0and said it\u00a0contained\u00a0the incident.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to Bloomberg, cybersecurity firm Mandiant has also warned about a hacking campaign linked to a group that calls itself\u00a0ShinyHunters. The group is using\u00a0<\/span><b><span data-contrast=\"auto\">vishing, which means\u00a0scam\u00a0phone calls<\/span><\/b><span data-contrast=\"auto\">,\u00a0<\/span><b><span data-contrast=\"auto\">to trick people into giving up their login information.<\/span><\/b><span data-contrast=\"auto\">\u00a0Once attackers get those logins, they can access cloud tools and online work systems that companies use every day. The group has said they are behind some of these recent attacks, but that has not been independently confirmed.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Red flags to watch for:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Calls that pressure you to approve a login, reset credentials, or share a one-time code<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Messages posing as IT support, a vendor, or \u201csecurity\u201d that try to rush you<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">MFA prompts you did not initiate<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">\u201cQuick verification\u201d requests that bypass normal internal processes<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">How this works:\u00a0<\/span><\/b><span data-contrast=\"auto\">Social engineering works because it blends into normal life. A convincing message or call gets someone to do one small \u201creasonable\u201d thing. Approve a prompt. Read a code. Reset access. That is often all an attacker needs to get inside with legitimate credentials, then pivot into the tools where valuable data lives.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<div class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"wpa-warning wpa-image-missing-alt aligncenter size-full wp-image-216406\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447.jpg\" alt=\"\" width=\"1000\" height=\"679\" data-warning=\"Missing alt text\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447.jpg 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447-300x204.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447-768x521.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447-190x129.jpg 190w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/div>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">TikTok\u2019s Privacy Policy Update Sparks Backlash<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Ok, we know this is called \u201cThis Week in Scams\u201d but this is also a cybersecurity newsletter.\u00a0So\u00a0when the biggest tech and privacy headline of the week is TikTok updating its privacy policy, we\u00a0have to\u00a0talk about it.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">The big picture:\u00a0<\/span><\/b><span data-contrast=\"auto\">TikTok\u2019s updated terms and privacy policy are raising fresh questions about what data is collected, especially around location.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">What happened:<\/span><\/b><span data-contrast=\"auto\">\u00a0TikTok confirmed\u00a0last week\u00a0that a new U.S.-based entity is in control of the app after splitting from ByteDance earlier this year. That same day,\u00a0<\/span><a href=\"https:\/\/www.cbsnews.com\/news\/tiktok-new-terms-of-service-privacy-geolocation-personal-information\/\"><span data-contrast=\"none\">CBS reported TikTok published updated terms and a new privacy policy<\/span><\/a><span data-contrast=\"auto\">, which prompted backlash on social media.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">CBS reported that one major point of concern is language stating TikTok may collect precise location information if users enable location services in device settings.\u00a0This is\u00a0reportedly a\u00a0shift from\u00a0previous\u00a0policy\u00a0language, and\u00a0TikTok said it plans to give U.S. users a prompt to opt in or opt out when precise location features roll out.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to CBS, some users are also concerned the new privacy policy\u00a0would allow the TikTok to more easily\u00a0share their\u00a0private data\u00a0with the federal and local government.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">That fear is based on a\u00a0change in\u00a0policy\u00a0language\u00a0stating\u00a0that\u00a0TikTok &#8220;processes such sensitive personal information in accordance with applicable law.&#8221;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">A quick, practical takeaway:\u00a0<\/span><\/b><span data-contrast=\"auto\">This is a good reminder that \u201cprivacy policy drama\u201d usually comes down to\u00a0<\/span><b><span data-contrast=\"auto\">one thing you can\u00a0actually control:\u00a0your app permissions.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">What to do (general privacy steps):<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Check your phone settings for TikTok and confirm whether location access is Off, While Using, or Always.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">If your device supports it, consider turning off precise location for apps that do not truly need it.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Do a quick permission sweep across social apps: location, contacts, photos, microphone, camera, and Bluetooth.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Make sure your account is protected with a strong, unique password and two-factor authentication.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Note: This is not a recommendation about whether to keep or remove any specific app.\u00a0It\u2019s\u00a0a reminder that your device settings matter and they are worth revisiting.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Grubhub Confirms a Data Breach Amid Reports of Extortion<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">The big picture:\u00a0<\/span><\/b><span data-contrast=\"auto\">Even when a company says payment details were not affected, a breach can still create risk because stolen data often gets reused for phishing.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">What happened:<\/span><\/b><span data-contrast=\"auto\">\u00a0According to\u00a0<\/span><a href=\"https:\/\/www.google.com\/search?q=bleeping+computer+grub+hub&amp;oq=bleeping+computer+grub+hub&amp;gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIJCAEQIRgKGKABMgkIAhAhGAoYoAEyCQgDECEYChigATIJCAQQIRgKGKABMgYIBRAhGAoyBwgGECEYjwIyBwgHECEYjwLSAQgyODAyajBqN6gCALACAA&amp;sourceid=chrome&amp;ie=UTF-8\"><span data-contrast=\"none\">BleepingComputer<\/span><\/a><span data-contrast=\"auto\">,\u00a0Grubhub confirmed unauthorized individuals downloaded data from certain systems and that it investigated, stopped the activity, and is taking steps to strengthen security.\u00a0Sources told\u00a0BleepingComputer\u00a0the company is facing extortion demands tied to stolen data. Grubhub said sensitive information like financial details and order history was not\u00a0affected, and\u00a0did not provide more detail on timing or scope.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Red flags to watch for next:\u00a0<\/span><\/b><span data-contrast=\"auto\">Breach headlines are often followed by\u00a0scam\u00a0waves. Be on alert for:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">\u201cRefund\u201d or \u201corder problem\u201d emails you did not request<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Fake customer support messages asking you to verify account details<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Password reset prompts you did not initiate<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Links to \u201cresolve your account\u201d that\u00a0don\u2019t\u00a0come from a known, official domain<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">How this works:\u00a0<\/span><\/b><span data-contrast=\"auto\">Customer support systems can\u00a0contain\u00a0personal details that make\u00a0scams\u00a0feel real. Names, emails, and account notes are often enough for attackers to craft messages that sound like legitimate help, especially when the brand is already in the news.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-208738\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner.jpg\" alt=\"Google search tab on laptop\" width=\"1000\" height=\"668\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner.jpg 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner-300x200.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner-768x513.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner-193x129.jpg 193w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Fake Chrome Extensions Are Quietly Taking Over Accounts<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">The big picture:\u00a0<\/span><\/b><span data-contrast=\"auto\">Some browser extensions that look like normal workplace tools are\u00a0actually designed\u00a0to hijack accounts and lock users out of their own security controls.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">What happened:<\/span><\/b><span data-contrast=\"auto\">\u00a0Security\u00a0researchers\u00a0<\/span><a href=\"https:\/\/www.foxnews.com\/tech\/malicious-google-chrome-extensions-hijack-accounts\"><span data-contrast=\"none\">told Fox News<\/span><\/a><span data-contrast=\"auto\">\u00a0that they uncovered\u00a0a campaign involving malicious Google Chrome extensions that impersonate well-known business and human resources platforms, including tools commonly used for payroll, benefits, and workplace access.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Researchers\u00a0identified\u00a0several fake extensions that were marketed as productivity or security tools. Once installed, they quietly ran in the background without obvious warning signs. According to Fox News, Google said the extensions have been removed from the Chrome Web Store, but some are still circulating on third-party download sites.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">How the\u00a0scam\u00a0actually works:<\/span><\/b><span data-contrast=\"auto\">\u00a0Instead of stealing passwords directly, the extensions captured active login sessions. When you sign into a website, your browser stores small files that keep you logged in. If attackers get access to those files, they can enter an account without ever knowing the password.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Some extensions went a step further by interfering with security settings. Victims were unable to change passwords, review login history, or reach account controls. That made it harder to detect the intrusion and even harder to recover access once something felt off.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Why this matters:\u00a0<\/span><\/b><span data-contrast=\"auto\">This kind of attack removes the safety net people rely on when accounts are compromised. Password resets and two-factor authentication only help if you can reach them. By cutting off access to those tools, attackers can\u00a0maintain\u00a0control longer and move through connected systems with less resistance.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">What to watch for:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Browser extensions you\u00a0don\u2019t\u00a0remember installing<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Add-ons claiming to manage HR, payroll, or internal business access<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Missing or inaccessible security settings on accounts<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Being logged into accounts you did not recently open<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">A quick safety check:\u00a0<\/span><\/b><span data-contrast=\"auto\">Take a few minutes to review your browser extensions. Remove anything unfamiliar or unnecessary, especially tools tied to work platforms. Extensions have deep access to your browser, which means they deserve the same scrutiny as any other software you install.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">McAfee\u2019s Safety Tips for This Week<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Be\u00a0skeptical\u00a0of \u201chelpful\u201d tools.<\/span><\/b><span data-contrast=\"auto\">\u00a0Browser extensions, workplace add-ons, and productivity tools can have deep access to your accounts. Only install what you truly need and remove anything unfamiliar.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Treat calls and prompts with caution.<\/span><\/b><span data-contrast=\"auto\">\u00a0Unexpected login requests, MFA approvals, or \u201cIT support\u201d outreach are common entry points for social engineering. If you\u00a0didn\u2019t\u00a0initiate\u00a0it, pause and verify.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Review app and browser permissions.<\/span><\/b><span data-contrast=\"auto\">\u00a0Take a few minutes to check what apps and extensions can access your location, accounts, and data.\u00a0Small changes\u00a0here can significantly reduce risk.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Protect your logins first.<\/span><\/b><span data-contrast=\"auto\">\u00a0Use strong, unique passwords and enable two-factor authentication on email and work-related accounts. If attackers get your email, they can reset\u00a0almost everything\u00a0else.\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/learn\/password-manager\/\"><span data-contrast=\"none\">McAfee\u2019s Password Manager<\/span><\/a><span data-contrast=\"auto\">\u00a0can help you create and store unique passwords for\u00a0all of\u00a0your accounts.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Expect follow-up\u00a0scams\u00a0after headlines.<\/span><\/b><span data-contrast=\"auto\">\u00a0When breaches or policy changes make the news, scammers often follow with phishing messages that reference them. Extra\u00a0skepticism\u00a0in the days and weeks after a\u00a0story breaks\u00a0can prevent bigger problems later.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week in\u00a0scams, three headlines tell the same story: attackers are getting better at manipulating people, not just breaking into&#8230;<\/p>\n","protected":false},"author":1440,"featured_media":203196,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667,10661,13],"tags":[],"coauthors":[16632],"class_list":["post-226123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-internet-security","category-privacy-identity-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion | McAfee Blog<\/title>\n<meta name=\"description\" content=\"A wave of phishing cyberattacks hit Bumble, Match, Panera, and CrunchBase, while Grubhub confirms a breach and TikTok updates its privacy policy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"A wave of phishing cyberattacks hit Bumble, Match, Panera, and CrunchBase, while Grubhub confirms a breach and TikTok updates its privacy policy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-30T11:00:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brooke Seipel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Seipel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion\",\"datePublished\":\"2026-01-30T11:00:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/\"},\"wordCount\":1506,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\",\"articleSection\":[\"Security News\",\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/\",\"name\":\"This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\",\"datePublished\":\"2026-01-30T11:00:42+00:00\",\"description\":\"A wave of phishing cyberattacks hit Bumble, Match, Panera, and CrunchBase, while Grubhub confirms a breach and TikTok updates its privacy policy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security News\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion | McAfee Blog","description":"A wave of phishing cyberattacks hit Bumble, Match, Panera, and CrunchBase, while Grubhub confirms a breach and TikTok updates its privacy policy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion | McAfee Blog","og_description":"A wave of phishing cyberattacks hit Bumble, Match, Panera, and CrunchBase, while Grubhub confirms a breach and TikTok updates its privacy policy.","og_url":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2026-01-30T11:00:42+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","type":"image\/png"}],"author":"Brooke Seipel","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Brooke Seipel","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion","datePublished":"2026-01-30T11:00:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/"},"wordCount":1506,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","articleSection":["Security News","Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/","url":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/","name":"This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","datePublished":"2026-01-30T11:00:42+00:00","description":"A wave of phishing cyberattacks hit Bumble, Match, Panera, and CrunchBase, while Grubhub confirms a breach and TikTok updates its privacy policy.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/scam-news-this-week-tiktok-data-hinge-bumble-grubhub-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Security News","item":"https:\/\/www.mcafee.com\/blogs\/security-news\/"},{"@type":"ListItem","position":3,"name":"This Week in Scams: Dating App Breaches, TikTok Data, Grubhub Extortion"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/226123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=226123"}],"version-history":[{"count":9,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/226123\/revisions"}],"predecessor-version":[{"id":226147,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/226123\/revisions\/226147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/203196"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=226123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=226123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=226123"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=226123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}