Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

How North Korean spies spent months in-person to drain $285 million from Drift

May 2, 2026

Crypto industry backs CLARITY Act yield compromise, pushes Senate Banking for markup

May 2, 2026

There Are New Developments in the KelpDAO Hack, the Largest of Recent Times, Which Affected Aave

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Genetic Data Stolen from 23andMe in Credential Stuffing Attack
Security

Genetic Data Stolen from 23andMe in Credential Stuffing Attack

October 10, 2023No Comments4 Mins Read

Genetic testing company 23andMe is investigating a data breach that exposed customer information, including profile photos, birth years, and ancestry details of millions of its users.

The compromised data was obtained through unauthorized access to individual 23andMe accounts, the company said in a statement reported by Ars Technica. Preliminary results suggest the login credentials used to access the accounts “may have been gathered by a threat actor from data leaked during incidents involving other online platforms where users have recycled login credentials,” 23andMe said.

The technique, known as credential stuffing, involves using usernames and passwords exposed in previous breaches to break into other online accounts.

Following a claim that someone had gained access to and is selling certain 23andMe customer data, we conducted an investigation. We have not identified any unauthorized access to our systems. We will continue to monitor the situation.

— 23andMeSupport (@23andMeSupport) October 4, 2023

23andMe said in a blog post that it has no evidence of an actual breach of its systems. “We do not have any indication at this time that there has been a data security incident within our systems,” the company wrote.

According to Wired, the breach specifically targeted users of Ashkenazi Jewish heritage. Hackers posted an initial data sample on the platform BreachForums earlier this week, claiming it contained 1 million data points exclusively about Ashkenazi Jews.

The data was obtained by scraping profile information of relatives connected through 23andMe’s “DNA Relatives” feature, which allows customers to connect with genetic matches on the platform. By accessing compromised accounts, the hacker could amass profiles of related users who had opted into sharing their information.

See also  Up just 0.2% on $36M loot

“We believe that the threat actor may have then, in violation of our terms of service, accessed 23andme.com accounts without authorization and obtained information from those accounts,” explained 23andMe in its blog post.

This Is How Much Your Data Sells For on the Dark Web

On hacking forums last week, an unknown user advertised the sale of 23andMe user data, claiming to have obtained information on over 7 million customers. The leaked data included “full names, usernames, profile photos, sex, date of birth, genetic ancestry results, and geographical location,” according to BleepingComputer.

Another forum user reportedly offered access to 23andMe profiles in bulk, with prices ranging from $1 to $10 per account.

23andMe did not disclose details on the number of users impacted or the extent of the data leak. But according to Ars Technica, one database contained 1 million customers of Ashkenazi Jewish heritage, while a second held 300,000 user profiles of Chinese ancestry.

Security experts have repeatedly cited the risks of compromised genetic data. “Your DNA is the most valuable thing you own,” warned the U.S. National Counterintelligence and Security Center in February 2021. “It holds the most intimate details of your past, present and potential future — whether you are prone to addiction or high-risk for cancer.”

“Losing your DNA is not like losing a credit card,” the center continued. “You can order a new credit card, but you cannot replace your DNA. The loss of your DNA not only affects you, but your relatives and, potentially, generations to come.”

Disrupting 23andMe

See also  Bitmain fired employees after salary data leak

23andMe said it reported the breach to law enforcement and encouraged customers to reset passwords and enable two-factor authentication.

“We actively and routinely monitor and audit our systems to ensure that your data is protected,” 23andMe said. “When we receive information through those processes or from other sources claiming customer data has been accessed by unauthorized individuals, we immediately investigate to validate whether this information is accurate.”

The genetic testing company, which offers insights into ancestry and health risks based on DNA analysis, has amassed genetic data on more than 14 million customers since its founding in 2006.

23andMe said the leaked data did not contain any genomic details. But privacy advocates have long raised concerns about the sensitivity of DNA analysis results and ethnic data being compromised in a breach.

The 23andMe breach comes amid a wave of major cyber attacks exposing sensitive user information. Last year, 10.9 million accounts were leaked in total, with 10 accounts being leaked every second, according to digital privacy firm Surfshark.

Editor’s note: This story was drafted with Decrypt AI from sources referenced in the text, and fact-checked by Ozawa.

Source link

23andMe attack Credential Data Genetic Stolen Stuffing

Related Posts

How North Korean spies spent months in-person to drain $285 million from Drift

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026
Top Posts

Taiwanese Crypto Trader's 6-Cent Fee Leads to $310K Win in Tax-Receipt Lottery

October 5, 2023

How crypto made and undid the $100M Incognito dark web market

February 6, 2026

Bitcoin shrugs off Trump's new tariffs, nears $68,000 as altcoins lead modest bounce

February 20, 2026

Type above and press Enter to search. Press Esc to cancel.