Genetic profiling company 23andMe is currently investigating a data scraping incident where private user information was stolen from its website. The confirmation came five days after an undisclosed entity advertised the sale of private data of millions of 23andMe users on an online crime forum. The alleged stolen data included details like origin estimation, phenotype, health records, photographs, and other identification data. Speculation arose that the CEO of 23andMe knew about this breach two months prior and had kept it under wraps. However, in response, a representative of the company contested that there's no proof of 'health information' being part of the posted data and currently, these are just unverified claims.
Recent updates have identified further fallout of the 23andMe breach. A spokesperson for 23andMe, Katie Watson, informed TechCrunch that hackers accessed the personal data of approximately 5.5 million customers who use the DNA Relatives feature. This feature allows users to share some of their genetic data with others. The compromised data includes names, birth years, relationship labels, the percentage of DNA shared with relatives, ancestry reports, and self-reported locations.
Additionally, another group of about 1.4 million people who opted into DNA Relatives had their Family Tree profile information accessed. This includes display names, relationship labels, birth years, self-reported locations, and information on whether they chose to share their data. 23andMe had declared part of its email as "on background," meaning both parties must agree to the terms in advance. TechCrunch published the reply as they were not given an opportunity to reject these terms.
The breach was attributed to data scraping, a method where attackers systematically extract smaller bits of information available to individual users, ultimately compiling large volumes of data. The attackers had unauthorized access to specific 23andMe accounts, which had the DNA relative feature activated. This feature lets users find potential relatives by viewing the basic profile details of others who have also opted into the feature. Officials from 23andMe emphasized that there isn’t any evidence suggesting a direct breach in their security systems. Instead, they suspect the login credentials might have been gathered from data leaks from other platforms where users reused their passwords. It was highlighted that the attackers have, in all likelihood, violated the company’s terms of service. Reports have emerged claiming that the data dump consists of 13 million pieces of information, with specifics regarding the nature and number of affected users still undisclosed. However, notable mentions include a leaked database of 1 million users of Ashkenazi descent and another 300,000 users of Chinese descent, all of whom had activated the DNA relative feature.
Recent events highlight the inherent risks associated with storing genetic data online. In 2018, another genetic data company, MyHeritage, faced a breach where over 92 million users' email addresses and passwords were compromised. The same year, officials in California utilized a different genealogy site, GEDMatch, to locate a suspect related to murders that had taken place 40 years prior. The suspect was identified not through his DNA but a relative's who had submitted a sample to GEDMatch. Storing genetic information online offers benefits like tracing lineage and finding relatives, but it also poses significant privacy threats. Even with strong passwords and two-factor authentication, as advocated by 23andMe, users' data remains vulnerable. The only foolproof way to safeguard it from online theft is to avoid online storage altogether.
SOAP Notes on what to consider about the 23andMe breach: Subjective, Objective, Assessment, and Plan
Subjective (Patient's feelings, history, complaints, etc.):
- Concerns about the safety and security of storing genetic information online.
- Anecdotal mentions of past breaches affecting other users.
Objective (Factual, measurable data):
- 23andMe confirmed a data scraping incident involving private user data.
- Unknown entity advertised the sale of millions of 23andMe user data.
- Data purportedly includes origin estimation, phenotype, health records, photos, and identification.
- Attackers gained unauthorized access using the DNA relative feature.
- There are claims of around 13 million pieces of data being stolen.
- In 2018, MyHeritage reported a breach affecting 92 million users.
- Law enforcement officials have previously used genealogy sites for investigations.
Assessment (Professional's judgment based on the above two):
- DNA testing platforms, while beneficial for tracing lineage and identifying relatives, carry inherent risks regarding user data privacy.
- Even with advanced security features, such as strong passwords and two-factor authentication, vulnerabilities still exist.
- External breaches (as seen in other online platforms where users recycle passwords) can indirectly compromise security in DNA testing platforms.
Plan (Recommendations or future plans):
- Users should exercise caution when deciding to store genetic information online.
- Always use unique, strong passwords for each online platform and avoid reusing passwords across platforms.
- Frequently review and update security settings on DNA testing platforms.
- Remain informed and periodically check the privacy policies and terms of service of these companies.
- Consider the benefits against potential risks before opting into additional features like the DNA relative feature.
- If possible, avoid online storage of critical genetic information altogether.
More links
-
23andMe tells victims it’s their fault that their data was breachedFacing more than 30 lawsuits from victims of its massive data breach, 23andMe is now deflecting the blame to the victims themselves in an attempt to absolve itself from any responsibility, according to a letter sent to a group of victims seen by TechCrunch.
-
23andMe confirms hackers stole ancestry data on 6.9 million usersA spokesperson for 23andMe, Katie Watson, informed TechCrunch that hackers accessed the personal data of approximately 5.5 million customers who use the DNA Relatives feature. This feature allows users to share some of their genetic data with others. The compromised data includes names, birth years, relationship labels, the percentage of DNA shared with relatives, ancestry reports, and self-reported locations. Additionally, another group of about 1.4 million people who opted into DNA Relatives h
-
23andMe says hackers accessed ‘significant number’ of files about users’ ancestryGenetic testing company 23andMe announced on Friday that hackers accessed around 14,000 customer accounts in the company’s recent data breach. In a new filing with the U.S. Securities and Exchange Commission published Friday, the company said that, based on its investigation into the incident, it had determined that hackers had accessed 0.1% of its customer base. According to the company’s most recent annual earnings report, 23andMe has “more than 14 million customers worldwide,” which means 0.
-
Hacker leaks millions more 23andMe user records on cybercrime forumThe same hacker who leaked a trove of user data stolen from the genetic testing company 23andMe two weeks ago has now leaked millions of new user records.
-
If DNA test kits are on your holiday shopping list - a message from the FTCA personalized holiday gift used to mean a shirt with a monogram. But the popularity of at-home DNA test kits suggests that personalized presents have gotten a lot more personal. If genetic test kits are on your shopping list for family or friends – or if you’re buying one for yourself – the FTC has three things to think about first.