#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

35 C
Dubai
Thursday, July 31, 2025
HomeTopics 1Application SecurityTea App Confirms Cyberattack: Legacy Data Leak Exposes 72,000 Images Including Selfie...

Tea App Confirms Cyberattack: Legacy Data Leak Exposes 72,000 Images Including Selfie IDs

Date:

Related stories

Allianz Life Suffers Data Breach via External Hack: Consumer Data at Risk

Allianz Life Insurance Company of North America has disclosed...

US Nuclear Agency Hacked Through Microsoft SharePoint Flaws

Microsoft SharePoint has frequently made headlines—and often for negative...
spot_imgspot_imgspot_imgspot_img

On 25 July 2025, women-centric platform Tea confirmed a serious cybersecurity incident involving unauthorized access to a legacy storage system. Roughly 72,000 images, including 13,000 user-submitted selfie IDs, were accessed. This breach raises fresh concerns around data governance, platform security, and law enforcement compliance requirements for digital platforms.

At 6:44 AM PST on 25 July 2025, the Tea App team detected unauthorized access to one of its systems. Immediate containment actions were taken, including pulling the system offline and initiating a full-scale investigation with assistance from external cybersecurity services.

Legacy System Breach

The compromised environment was a legacy data storage system used before February 2024. While the current system remains unaffected, forensic analysis confirms that an attacker accessed:

  • 72,000 total images
  • 13,000 images submitted during identity verification (mostly selfie IDs)
  • 59,000 public images from posts, comments, and direct messages

According to Tea’s official statement, the legacy data was retained to comply with law enforcement mandates on cyber-bullying investigations during the platform’s early development stage.

“We are taking every necessary step to ensure the security of our platform and prevent further exposure,” Tea said in its official release dated 25 July 2025.

Forensic Details & Containment Measures

The Tea team confirmed the breach occurred due to unmigrated legacy content stored under an identifier link from before February 2024. No email addresses or phone numbers were compromised.

Users who signed up after February 2024 remain unaffected.

What Was Accessed

Data TypeVolumeStatus
Verification selfies13,000Accessed
Public media files59,000Accessed
Email addresses0Not accessed
Phone numbers0Not accessed

The company is now working to notify affected users and is offering free identity protection services to those impacted.

Regulatory and Global Implications

Though the breach appears confined to the Tea platform, the incident touches on wider cybersecurity best practices and data retention policies:

  • Law enforcement data mandates forced Tea to retain identity data beyond typical timelines.
  • Data governance gaps emerged when legacy content was not fully migrated.
  • Incident response was prompt but reactive indicating need for more proactive cybersecurity training.

Tea’s quick escalation to the FBI and external cyber forensic experts indicates adherence to breach protocol standards in the U.S. and a willingness to remain transparent with users.

Official Quotes

“This is a legacy data issue. The information was retained only to support law enforcement investigations related to cyberbullying. We are strengthening our security posture,” – Tea spokesperson, 25 July 2025

“Our team is fully engaged with the investigation and has already taken the affected systems offline. New users and systems remain safe,” – Official Tea support update

Actionable Takeaways for Security Professionals

  1. Audit legacy systems for dormant data that may not have been migrated.
  2. Limit retention of PII unless absolutely necessary and legally mandated.
  3. Classify data by sensitivity and enforce tailored access policies.
  4. Regularly rotate identifier links or legacy endpoints.
  5. Create automated flags for system anomalies—particularly in storage access.
  6. Implement offline backups and ensure access logs are immutable.
  7. Engage law enforcement proactively but define clear data retention timelines.
  8. Train development teams in secure-by-design and privacy-by-default principles.
  9. Disclose breaches promptly to build trust with users and authorities.
  10. Offer remediation such as free identity monitoring to affected users.

Conclusion

The Tea App breach underscores a growing concern in digital platforms: legacy data retention and law enforcement compliance can create latent vulnerabilities. While no critical contact data was exposed, the compromised ID selfies and public images reveal the real-world privacy risks of poorly governed storage practices. Tea’s transparent response and partnership with external experts is commendable but a stronger foundation in secure design and proactive governance is essential going forward.

Source List

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here