{"id":129698,"date":"2023-10-23T12:52:59","date_gmt":"2023-10-23T16:52:59","guid":{"rendered":"https:\/\/rbach.net\/?p=129698"},"modified":"2024-05-22T19:50:26","modified_gmt":"2024-05-22T23:50:26","slug":"are-you-at-fault-for-the-23andme-data-breach","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/are-you-at-fault-for-the-23andme-data-breach\/","title":{"rendered":"Are You at Fault for the 23andMe Data Breach"},"content":{"rendered":"\r\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-129714\" title=\"Are You a Fault for the 23andMe Data Breach\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/23anyou.png?resize=125%2C125&#038;ssl=1\" alt=\"Are You at Fault for the 23andMe Data Breach\" width=\"125\" height=\"125\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/23anyou.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/23anyou.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/23anyou.png?w=629&amp;ssl=1 629w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/><strong>&#8211; Updated 10\/28\/2023-<\/strong> The data breach at 23andMe must be really bad. The data breach has drawn the <a title=\"Cassidy letter on 23andMe data leak\" href=\"https:\/\/www.help.senate.gov\/imo\/media\/doc\/cassidy_letter_on_23andme_data_leak.pdf\" target=\"_blank\" rel=\"nofollow noopener\">attention<\/a> (PDF) of a business loving GOP Senator.<\/p>\r\n<p style=\"text-align: center;\">&#8212;<\/p>\r\n<p>A data breach has affected customers of the genomics firm 23andMe (<a title=\"22andMe\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-ME\/\" target=\"_blank\" rel=\"nofollow noopener\">ME<\/a>). 23andMe is a U.S. biotechnology firm that offers genetic testing services to customers. Customers send a saliva sample to its labs and get back an ancestry and genetic predispositions report. The <a title=\"Genetics firm 23andMe says user data stolen in credential stuffing attack\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/genetics-firm-23andme-says-user-data-stolen-in-credential-stuffing-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">exposed<\/a> information from this data breach includes full names, usernames, profile photos, sex, date of birth, genetic ancestry results, and geographical location.<\/p>\r\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hacker-leaks-millions-of-new-23andme-genetic-data-profiles\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-129709 size-medium\" title=\"23andMe data breach\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/firefox_KbyGNkeZx7-e1697906603616-150x43.jpg?resize=150%2C43&#038;ssl=1\" alt=\"23andMe data breach\" width=\"150\" height=\"43\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/firefox_KbyGNkeZx7-e1697906603616.jpg?resize=150%2C43&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/firefox_KbyGNkeZx7-e1697906603616.jpg?resize=75%2C22&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/firefox_KbyGNkeZx7-e1697906603616.jpg?resize=768%2C221&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/firefox_KbyGNkeZx7-e1697906603616.jpg?w=1018&amp;ssl=1 1018w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/firefox_KbyGNkeZx7-e1697906603616.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Reports indicate that a hacker first posted the data breach on August 11, 2023. The hacker posted on the <a title=\"Hydra cybercrime forum\" href=\"https:\/\/en.wikipedia.org\/wiki\/Hydra_Market#:~:text=On%20April%205%2C%202022%2C%20American,longest%2Drunning%20dark%20web%20marketplace.\" target=\"_blank\" rel=\"nofollow noopener\">Hydra cybercrime forum<\/a>. The hacker claimed to possess 300 terabytes of stolen 23andMe user data. The data re-emerged on October 2, 2023, when a hacker using the username \u201cGolem\u201d posted the records on the cybercrime forum <a title=\"BreachForums\" href=\"https:\/\/en.wikipedia.org\/wiki\/BreachForums\" target=\"_blank\" rel=\"nofollow noopener\">BreachForums<\/a>. The hacker openly made an anti-Semitic threat, boasting that it was a targeted attack on <a title=\"Ancient DNA Provides New Insights into Ashkenazi Jewish History\" href=\"https:\/\/hms.harvard.edu\/news\/ancient-dna-provides-new-insights-ashkenazi-jewish-history\" target=\"_blank\" rel=\"nofollow noopener\">Ashkenazi Jews<\/a>. The hacker claimed the data breach records contained \u201c<em>information on all wealthy families serving Zionism \u2026 You can see the wealthiest people living in the US and Western Europe on this list.\u201d<\/em><\/p>\r\n<h3>The data breach expands<\/h3>\r\n<p><a href=\"https:\/\/www.dailymail.co.uk\/news\/article-12646383\/23andMe-breach-hacker-royal-family.html\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-129713 size-medium\" title=\"23andMe data breach\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chrome_0me5ZV9Rrb.jpg?resize=150%2C103&#038;ssl=1\" alt=\"23andMe data breach\" width=\"150\" height=\"103\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chrome_0me5ZV9Rrb.jpg?resize=150%2C103&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chrome_0me5ZV9Rrb.jpg?resize=1024%2C701&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chrome_0me5ZV9Rrb.jpg?resize=75%2C51&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chrome_0me5ZV9Rrb.jpg?resize=768%2C526&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chrome_0me5ZV9Rrb.jpg?w=1036&amp;ssl=1 1036w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chrome_0me5ZV9Rrb.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>On October 16, Golem claimed the data contained \u201c<em>samples from hundreds of families, including the royal family, Rothschilds, Rockefellers, and more.<\/em>\u201d The reference to the Rothschilds, a subject of antisemitic conspiracy theories, <a title=\"23andMe scraping incident leaked data on 1.3 million users of Ashkenazi and Chinese descent\" href=\"\/\/therecord.media\/scraping-incident-genetic-testing-site\" target=\"_blank\" rel=\"nofollow noopener\">echoes<\/a> Golem\u2019s previous publication of 23andMe records allegedly focused on people of Ashkenazi Jewish descent.<\/p>\r\n<p>23andMe spokesperson Andy Kill <a title=\"Hacker leaks millions more 23andMe user records on cybercrime forum\" href=\"https:\/\/techcrunch.com\/2023\/10\/18\/hacker-leaks-millions-more-23andme-user-records-on-cybercrime-forum\/\" target=\"_blank\" rel=\"nofollow noopener\">told<\/a> TechCrunch in an emailed statement that the company was made aware of this new leak and that it is \u201c<em>reviewing the data to determine if it is legitimate.<\/em>\u201d<\/p>\r\n<h3>23andMe blames customers for data breach<\/h3>\r\n<p>On October 6, 23andMe announced that hackers behind the data breach had obtained some user data. They claimed that to amass the stolen data the hackers used credential stuffing. Credential stuffing is a common technique where hackers try combinations of usernames or emails and corresponding passwords that are already public from other data breaches.<\/p>\r\n<p>In response to the data breach, 23andMe <a title=\"Addressing Data Security Concerns\" href=\"https:\/\/blog.23andme.com\/articles\/addressing-data-security-concerns\" target=\"_blank\" rel=\"nofollow noopener\">urged<\/a> their users to change their passwords and enable multi-factor authentication. On its official page addressing the data breach, <strong>23andMe blamed the incident on its customers for reusing passwords<\/strong>\u00a0and DNA Relatives. DNA Relatives is an opt-in feature the firm offers. It allows users to see the data of other opted-in users whose genetic data matches theirs. If a user had this feature turned on, it could allow hackers to scrape data on more than one user by breaking into a single user\u2019s account.<\/p>\r\n<h3>Splitting hairs<\/h3>\r\n<p>23andMe stated it didn\u2019t find any evidence of a &#8220;data security incident&#8221; because the information hackers gathered was available to opted-in users. But putting the burden on consumers to protect their own sensitive data with strong passwords and careful management is wrongheaded, said <a title=\"Suzanne Bernstein\" href=\"https:\/\/epic.org\/people\/suzanne-bernstein\/\" target=\"_blank\" rel=\"nofollow noopener\">Suzanne Bernstein<\/a>, with the <a title=\"Electronic Privacy Information Center\" href=\"https:\/\/epic.org\/\" target=\"_blank\" rel=\"nofollow noopener\">Electronic Privacy Information Center<\/a> told <a title=\"Worried about the 23andMe hack? Here\u2019s what you can do.\" href=\"https:\/\/www.washingtonpost.com\/technology\/2023\/10\/12\/23andme-hack-data-breach\/\" target=\"_blank\" rel=\"nofollow noopener\">WAPO<\/a> \u201c<em>If 23andMe is collecting, storing and processing a tremendous amount of very highly sensitive personal data, I think at the end of the day they should take responsibility for that.\u201d\u00a0<\/em><\/p>\r\n<h3>Data breach victims not protected<\/h3>\r\n<p>The type of information genetic testing companies like 23andMe collect is currently not protected by the Health Insurance Portability and Accountability Act (<a title=\"Health Insurance Portability and Accountability Act of 1996 (HIPAA)\" href=\"https:\/\/web.archive.org\/web\/20240515064229\/https:\/\/www.cdc.gov\/phlp\/publications\/topic\/hipaa.html\" target=\"_blank\" rel=\"nofollow noopener\">HIPAA<\/a>). 23andMe still allows for third-party data sharing in its privacy policy.<\/p>\r\n<h3>How to Protect Your Data from Breaches<\/h3>\r\n<p>Now that your genetic data is probably in the wild for anyone to abuse, you should do the following:<\/p>\r\n<ol>\r\n<li style=\"text-align: left;\"><strong>Choose unique, impossible-to-guess passwords.<br \/><\/strong>23andMe users should immediately change their passwords. The new password should be complex and never have been used on other sites. A better response would be to use a password manager.<\/li>\r\n<li><strong>Next turn on two-factor authentication.<\/strong><\/li>\r\n<li><strong>Request to delete your data. <br \/><\/strong>A 23andMe customer can request to delete their information from the site. If you live in a state with a comprehensive privacy law company is required to do so.<\/li>\r\n<li>A 23andMe customer can request their information be deleted from the site. But during the account deletion process, 23andMe tells users that the company and its partner lab will <strong>hang onto your \u201cgenetic information, date of birth and sex,\u201d after your account is deleted,<\/strong> per state and federal legal requirements, according to the <a title=\"Worried about the 23andMe hack? Here\u2019s what you can do.\" href=\"https:\/\/www.washingtonpost.com\/technology\/2023\/10\/12\/23andme-hack-data-breach\/\" target=\"_blank\" rel=\"nofollow noopener\">Washington Post<\/a>. <br \/><br \/>This means that even after 23andMe deletes your account, it still retains potentially sensitive genetic information. Researchers have shown that so-called anonymous genetic data can in some cases be re-identified.<br \/><br \/><\/li>\r\n<li><strong>Don\u2019t share genetic information<\/strong><br \/>Sharing your genetics with a DNA database increases your risk of botched criminal procedure, discrimination from insurance companies and employers, and targeted attacks such as blackmail, privacy experts say.<\/li>\r\n<\/ol>\r\n<h3><em>rb-<\/em><\/h3>\r\n<p><em>Now that your entire family&#8217;s DNA is out there there is no getting it back.<\/em><\/p>\r\n<p>&nbsp;<\/p>\r\n<p style=\"text-align: center;\"><em><strong><a title=\"How You Can Help the People of Ukraine\" href=\"https:\/\/www.obama.org\/updates\/help-ukraine\/\" target=\"_blank\" rel=\"nofollow noopener\">How you can help Ukraine!<\/a><\/strong><\/em><\/p>\r\n<p><strong>Related article<\/strong><\/p>\r\n<ul>\r\n<li><a title=\"Number of data records exposed worldwide from 1st quarter 2020 to 1st quarter 2023\" href=\"https:\/\/www.statista.com\/statistics\/1307426\/number-of-data-breaches-worldwide\/\" target=\"_blank\" rel=\"nofollow noopener\">Number of data records exposed worldwide from 1st quarter 2020 to 1st quarter 2023<\/a>\u00a0(<a title=\"Statista\" href=\"https:\/\/www.statista.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Statista<\/a>)<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a>\u00a0about IT, careers, and anything else that catches his attention since 2005. You can follow him on\u00a0<a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Customers of the genomics firm 23andMe have suffered a data breach and they blame the incident on its customers for reusing passwords.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[3652,3716,32,125],"class_list":["post-129698","post","type-post","status-publish","format-standard","hentry","tag-3652","tag-23andme","tag-business","tag-data-breach"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/129698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=129698"}],"version-history":[{"count":12,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/129698\/revisions"}],"predecessor-version":[{"id":129743,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/129698\/revisions\/129743"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=129698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=129698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=129698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}