23andMe under fire after failing to detect cyberattack for five months

Company has blamed customers for data breach

clock • 2 min read
23andMe under fire after failing to detect cyberattack for five months

Genetic testing company 23andMe is facing intensified scrutiny after revealing that it failed to detect malicious activity on its platform for a five-month period, allowing attackers to infiltrate user accounts.

23andMe, a US biotechnology and genomics firm, provides genetic testing services to customers, send them a comprehensive report on their ancestry and genetic predispositions.

In a series of data breach notifications submitted to California's attorney general, 23andMe said the attackers employed credential stuffing techniques between 29th April and 27th September 2023, compromising user accounts without detection.

The breach was only uncovered in October when hackers advertised the stolen data online, including on an unofficial subreddit dedicated to the company and a notorious hacking forum.

It was later found that the hackers had also advertised the stolen data on another hacking forum months earlier in August, underscoring the failure of 23andMe's security protocols.

While the exact scope of the breach remains unclear, 23andMe previously acknowledged that approximately 14,000 accounts were breached, affecting users who had enabled the DNA Relatives feature and ultimately exposing 6.9 million individuals' data.

DNA Relatives enables any account holder to search for potential genetic matches, regardless of how distant they may be. Users have the option to voluntarily share their information through DNA Relatives for others to access.

The recent breach notifications outlined the types of data that may have been compromised, which includes basic profile information such as last login date, relationship labels, predicted relationships, percentage of DNA shared, and account display names.

Users who opted to share additional information with DNA matches, including ancestry reports, matching DNA segments, location, family trees and personal bios, may also have had this data exposed.

While credential stuffing attacks can be challenging to detect, critics argue that 23andMe's delayed implementation of two-factor authentication (2FA), which it didn't roll out until November, after discovering the breach, indicates poor security protocols.

Customers affected by the breach have launched class action lawsuits against 23andMe in both the United States and Canada.

The company has defended its stance, attributing the breach to user negligence and maintaining that it upheld reasonable security measures under the California Privacy Rights Act.

In letters sent to lawyers representing breach victims, 23andMe reiterated its position, claiming that users were responsible for the breach due to their failure to update compromised login credentials.

In an attempt to mitigate legal repercussions, the company updated its Terms of Use on 30th November, introducing a new 60-day dispute resolution period. The changes make it more difficult for customers to join class action lawsuits by requiring disputes to be resolved through individual arbitration.

While 23andMe claims these changes were made to streamline the arbitration process and enhance customer understanding, they also serve to protect the company from accountability and limit the legal options available to affected individuals.

Legal experts have criticised these manoeuvres as "cynical" and "self-serving."

You may also like
'Levelling up cybersecurity is a team effort,' says Jacob DePriest of GitHub

Open Source

But security starts with developers, and AI isn’t going to replace them

clock 09 May 2024 • 5 min read
Cybersecurity Festival 2024: Four ways to cut your cyber insurance premiums

Finance

Certifications mean nothing without action

clock 08 May 2024 • 4 min read
IT Essentials: A cyber staycation

Security

The UK made headlines in security news

clock 07 May 2024 • 3 min read
Most read
03

LockBit leader unmasked

08 May 2024 • 3 min read
04

TikTok sues US government

09 May 2024 • 3 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Hacking

LockBit leader unmasked

LockBit leader unmasked

Named as Russian national Dmitry Khoroshev

clock 08 May 2024 • 3 min read
Ransomware group publishes stolen data from NHS Dumfries and Galloway on dark web

Ransomware group publishes stolen data from NHS Dumfries and Galloway on dark web

Chief Exec describes publication as “utterly abhorrent criminal act”

Penny Horwood
clock 07 May 2024 • 2 min read
MoD hacked: Personal details exposed

MoD hacked: Personal details exposed

Government suspects China

Tom Allen
clock 07 May 2024 • 2 min read