{"id":23521,"date":"2023-12-04T14:10:11","date_gmt":"2023-12-04T22:10:11","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/12\/04\/news-17251\/"},"modified":"2023-12-04T14:10:11","modified_gmt":"2023-12-04T22:10:11","slug":"news-17251","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/12\/04\/news-17251\/","title":{"rendered":"23andMe says, er, actually some genetic and health data might have been accessed in recent breach"},"content":{"rendered":"\n<p>In October <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/10\/23andme\">we reported<\/a> that the data of as many as seven million 23andMe customers were for sale on criminal forums following a password attack against the genomics company.<\/p>\n<p>Now, a <a href=\"https:\/\/www.sec.gov\/ix?doc=\/Archives\/edgar\/data\/1804591\/000119312523287449\/d242666d8ka.htm\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">filing with the US Securities and Exchange Commission (SEC)<\/a> has provided some more insight into the data theft. The filed amendment supplements the original Form 8-K submitted by 23andMe.<\/p>\n<p>The amendment says that an investigation showed that the attacker was able to directly access the accounts of roughly 0.1% of 23andMe&#8217;s users, which is about 14,000 of its 14 million customers. The attacker accessed the accounts using <a href=\"https:\/\/www.malwarebytes.com\/glossary\/credential-stuffing\">credential stuffing<\/a> which is where someone tries existing username and password combinations to see if they can log in to a service. These combinations are usually stolen from another breach and then put up for sale on the dark web. Because people often reuse passwords across accounts, cybercriminals buy those combinations and then use them to login on other services and platforms.<\/p>\n<p>With the breached accounts at their disposal, the attacker used 23andMe\u2019s opt-in DNA Relatives (DNAR) feature\u2014which matches users with their genetic relatives\u2014to access information about millions of other users. According to a spokesperson the DNAR profiles of roughly 5.5 million customers could be accessed in this way, plus the Family Tree profile information of 1.4 million additional DNA Relative participants.<\/p>\n<p>The 5.5 million DNAR Profiles contained sensitive details including self-reported information like display names and locations, as well as shared DNA percentages for DNA Relatives matches, family names, predicted relationships, and ancestry reports.<\/p>\n<p>For a subset of these accounts, the stolen data might contain health-related information based upon the user\u2019s genetics.<\/p>\n<p>The 1.4 million Family Tree profiles contain display names and relationship labels, plus other information that a user may have added, including birth year and location.<\/p>\n<p>23andMe is in the process of notifying users impacted by the incident. The company said it believes that the attacker activity is contained, and that it is working to have the publicly-posted information taken down.<\/p>\n<p>When the breach was first announced, 23andMe urged its users to ensure they have strong passwords, to avoid reusing passwords from other sites, and to enable <a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\">multi-factor authentication (MFA)<\/a>.<\/p>\n<p>Our Mark Stockley noted at the time:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cRespectfully, we would like to see 23andMe reach a different conclusion. Telling users to choose strong passwords and not to reuse them is great advice that just isn\u2019t working. It\u2019s good in theory but fails in practice. In a world where users have tens or even hundreds of logins to manage, password reuse and weak passwords that are easy to remember are inevitable.\u201d<\/p>\n<\/blockquote>\n<p>And it looks as if they listened to us. On the <a href=\"https:\/\/blog.23andme.com\/articles\/addressing-data-security-concerns\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">23andMe blog the updated article about the breach<\/a> now says:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cWe have taken steps to further protect customer data, including requiring all existing customers to reset their password and requiring two-step verification for all new and existing customers. The company will continue to invest in protecting our systems and data.\u201d<\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\" id=\"h-data-breach\">Data breach<\/h2>\n<p>There are some actions you can take if you are, or suspect you may have been, the victim of a data breach.<\/p>\n<ul>\n<li><strong>Check the vendor&#8217;s advice.<\/strong> Every breach is different, so check with the vendor to find out what&#8217;s happened, and follow any specific advice they offer.<\/li>\n<li><strong>Change your password.<\/strong> You can make a stolen password useless to thieves by changing it. Choose a&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/computer\/how-to-create-a-strong-password\" target=\"_blank\">strong password<\/a>&nbsp;that you don&#8217;t use for anything else. Better yet, let a&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/what-is-password-manager\" target=\"_blank\">password manager<\/a>&nbsp;choose one for you.<\/li>\n<li><strong>Enable two-factor authentication (2FA).<\/strong> If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\" target=\"_blank\">two-factor authentication (2FA)<\/a>&nbsp;can be phished just as easily as a password. 2FA that relies on a FIDO2 device can\u2019t be phished.<\/li>\n<li><strong>Watch out for fake vendors.<\/strong> The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify any contacts using a different communication channel.<\/li>\n<li><strong>Take your time.<\/strong> Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.<\/li>\n<li><strong>Set up identity monitoring.<\/strong> <a href=\"https:\/\/www.malwarebytes.com\/identity-theft-protection\">Identity monitoring<\/a> alerts you if your personal information is found being traded illegally online, and helps you recover after.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n<p><strong>We don&#8217;t just report on threats &#8211; we help safeguard your entire digital identit<\/strong>y<\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Protect your and your family&#8217;s personal information by using&nbsp;<a target=\"_blank\" href=\"https:\/\/www.malwarebytes.com\/identity-theft-protection\" rel=\"noreferrer noopener\">Malwarebytes Identity Theft Protection<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/12\/23andme-says-er-actually-some-genetic-and-health-data-might-have-been-accessed-in-recent-breach\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 23andMe has released new details about the credential stuffing attack that took place in October. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[20260,21323,30578,32,26699],"class_list":["post-23521","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-23andme","tag-credential-stuffing","tag-dna-reatives","tag-news","tag-personal"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23521"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23521\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23521"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}