December 2, 2023

Genetic testing big 23andMe confirmed {that a} information scraping incident resulted in hackers getting access to delicate person info and promoting it on the darkish net.

The knowledge of practically 7 million 23andMe customers was offered on the market on a cybercriminal discussion board this week. The knowledge included origin estimation, phenotype, well being info, photographs, identification information and extra. 23andMe processes saliva samples submitted by prospects to find out their ancestry.

When requested in regards to the submit, the corporate initially denied that the knowledge was professional, calling it a “deceptive declare” in a press release to Recorded Future Information.

The corporate later stated it was conscious that sure 23andMe buyer profile info was compiled by way of unauthorized entry to particular person accounts that have been signed up for the DNA Relative characteristic — which permits customers to decide in for the corporate to indicate them potential matches for relations.

“We wouldn’t have any indication presently that there was a knowledge safety incident inside our programs. Fairly, the preliminary outcomes of this investigation recommend that the login credentials utilized in these entry makes an attempt might have been gathered by a risk actor from information leaked throughout incidents involving different on-line platforms the place customers have recycled login credentials,” they stated.

“We consider that the risk actor might have then, in violation of our phrases of service, accessed 23andme.com accounts with out authorization and obtained info from these accounts. We’re taking this problem significantly and can proceed our investigation to verify these preliminary outcomes.”


A screenshot from the posting of 23andMe information on the BreachForums website.

When pressed on how compromising a handful of person accounts would give somebody entry to hundreds of thousands of customers, the spokesperson stated the corporate doesn’t consider the risk actor had entry to the entire accounts however moderately gained unauthorized entry to a a lot smaller variety of 23andMe accounts and scraped information from their DNA Relative matches.

The spokesperson declined to verify the precise variety of buyer accounts affected.

Anybody who has opted into DNA Kin can view primary profile info of others who make their profiles seen to DNA Relative contributors, a spokesperson stated.

Customers who’re genetically associated can entry ancestry info, which is made clear to customers once they create their DNA Kin profile, the spokesperson added.

As soon as the corporate has extra info from the investigation, they stated, it would decide one of the best strategy to notifying any impacted prospects.

‘A botch job’

The incident reveals how an organization’s buyer information could be susceptible even when intruders do not get deep into its community.

A researcher approached Recorded Future Information after analyzing the leaked database and located that a lot of it regarded actual. The researcher spoke on situation of anonymity as a result of he discovered the knowledge of his spouse and several other of her members of the family within the leaked information set. He additionally discovered different acquaintances and verified that their info was correct.

The researcher downloaded two information from the BreachForums submit and located that one had info on 1 million 23andMe customers of Ashkenazi heritage. The opposite file included information on greater than 300,000 customers of Chinese language heritage.

The information included profile and account ID numbers, names, gender, delivery yr, maternal and paternal genetic markers, ancestral heritage outcomes, and information on whether or not or not every person has opted into 23andme’s well being information.

“It seems the knowledge has been scraped from person profiles that are solely speculated to be shared between DNA Matches. So though this specific leak doesn’t comprise genomic sequencing information, it’s nonetheless information that shouldn’t be obtainable to the general public,” the researcher stated.

“23andme appears to suppose this isn’t an enormous deal. They maintain telling me that if I don’t need this information to be shared, I shouldn’t decide into the DNA relations characteristic. However that’s dismissing the significance of this information which ought to solely be viewable to DNA relations, not the general public. And the truth that somebody was in a position to scrape this information from 1.3 million customers is regarding. The hacker allegedly has extra information that they haven’t launched but.”

The researcher added that he found one other problem the place somebody may enter a 23andme profile ID, like those included within the leaked information set, into their URL and see somebody’s profile.

The information obtainable by way of this solely consists of profile photographs, names, delivery years and placement however doesn’t embrace take a look at outcomes.

“It’s very regarding that 23andme has such an enormous loophole of their web site design and safety the place they’re simply freely exposing peoples information simply by typing a profile ID into the URL. Particularly for a web site that offers with folks’s genetic information and private info. What a botch job by the corporate,” the researcher stated.

“I’ve tried contacting 23andme nevertheless they maintain denying that there’s something unsuitable and are replying with cookie cutter responses. I don’t know the best way to show this with out doxing myself. However that is fairly critical and nobody is taking it significantly.”

The safety insurance policies of genetic testing corporations like 23andMe have confronted scrutiny from regulators in latest weeks. Three weeks in the past, genetic testing agency 1Health.io agreed to pay the Federal Commerce Fee (FTC) a $75,000 tremendous to resolve allegations that it did not safe delicate genetic and well being information, retroactively overhauled its privateness coverage with out notifying and acquiring consent from prospects whose information it had obtained, and tricked prospects about their potential to delete their information.

Get extra insights with the

Recorded Future

Intelligence Cloud.

Study extra.

No earlier article

No new articles

Jonathan Greig

Jonathan Greig is a Breaking Information Reporter at Recorded Future Information. Jonathan has labored throughout the globe as a journalist since 2014. Earlier than shifting again to New York Metropolis, he labored for information retailers in South Africa, Jordan and Cambodia. He beforehand coated cybersecurity at ZDNet and TechRepublic.