Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

Prediction markets are ditching the 'casino' label to become a regular part of how people track the news

May 2, 2026

Altura Enables On-chain Lending With AVLT on Morpho

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Genetic Data Stolen from 23andMe in Credential Stuffing Attack
Security

Genetic Data Stolen from 23andMe in Credential Stuffing Attack

October 10, 2023No Comments4 Mins Read

Genetic testing company 23andMe is investigating a data breach that exposed customer information, including profile photos, birth years, and ancestry details of millions of its users.

The compromised data was obtained through unauthorized access to individual 23andMe accounts, the company said in a statement reported by Ars Technica. Preliminary results suggest the login credentials used to access the accounts “may have been gathered by a threat actor from data leaked during incidents involving other online platforms where users have recycled login credentials,” 23andMe said.

The technique, known as credential stuffing, involves using usernames and passwords exposed in previous breaches to break into other online accounts.

Following a claim that someone had gained access to and is selling certain 23andMe customer data, we conducted an investigation. We have not identified any unauthorized access to our systems. We will continue to monitor the situation.

— 23andMeSupport (@23andMeSupport) October 4, 2023

23andMe said in a blog post that it has no evidence of an actual breach of its systems. “We do not have any indication at this time that there has been a data security incident within our systems,” the company wrote.

According to Wired, the breach specifically targeted users of Ashkenazi Jewish heritage. Hackers posted an initial data sample on the platform BreachForums earlier this week, claiming it contained 1 million data points exclusively about Ashkenazi Jews.

The data was obtained by scraping profile information of relatives connected through 23andMe’s “DNA Relatives” feature, which allows customers to connect with genetic matches on the platform. By accessing compromised accounts, the hacker could amass profiles of related users who had opted into sharing their information.

See also  Texas city locals warned of crypto scam impersonating FBI

“We believe that the threat actor may have then, in violation of our terms of service, accessed 23andme.com accounts without authorization and obtained information from those accounts,” explained 23andMe in its blog post.

This Is How Much Your Data Sells For on the Dark Web

On hacking forums last week, an unknown user advertised the sale of 23andMe user data, claiming to have obtained information on over 7 million customers. The leaked data included “full names, usernames, profile photos, sex, date of birth, genetic ancestry results, and geographical location,” according to BleepingComputer.

Another forum user reportedly offered access to 23andMe profiles in bulk, with prices ranging from $1 to $10 per account.

23andMe did not disclose details on the number of users impacted or the extent of the data leak. But according to Ars Technica, one database contained 1 million customers of Ashkenazi Jewish heritage, while a second held 300,000 user profiles of Chinese ancestry.

Security experts have repeatedly cited the risks of compromised genetic data. “Your DNA is the most valuable thing you own,” warned the U.S. National Counterintelligence and Security Center in February 2021. “It holds the most intimate details of your past, present and potential future — whether you are prone to addiction or high-risk for cancer.”

“Losing your DNA is not like losing a credit card,” the center continued. “You can order a new credit card, but you cannot replace your DNA. The loss of your DNA not only affects you, but your relatives and, potentially, generations to come.”

Disrupting 23andMe

See also  AngelDrainer Scam Group Paid Saboteurs to Target Balancer

23andMe said it reported the breach to law enforcement and encouraged customers to reset passwords and enable two-factor authentication.

“We actively and routinely monitor and audit our systems to ensure that your data is protected,” 23andMe said. “When we receive information through those processes or from other sources claiming customer data has been accessed by unauthorized individuals, we immediately investigate to validate whether this information is accurate.”

The genetic testing company, which offers insights into ancestry and health risks based on DNA analysis, has amassed genetic data on more than 14 million customers since its founding in 2006.

23andMe said the leaked data did not contain any genomic details. But privacy advocates have long raised concerns about the sensitivity of DNA analysis results and ethnic data being compromised in a breach.

The 23andMe breach comes amid a wave of major cyber attacks exposing sensitive user information. Last year, 10.9 million accounts were leaked in total, with 10 accounts being leaked every second, according to digital privacy firm Surfshark.

Editor’s note: This story was drafted with Decrypt AI from sources referenced in the text, and fact-checked by Ozawa.

Source link

23andMe attack Credential Data Genetic Stolen Stuffing

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026
Top Posts

The SAFER Banking Act Can End Discriminatory Banking Practices

October 13, 2023

Agglayer Clears $200M Post‑Hack With Zero Incidents, Credits ZK Proof Security

April 25, 2026

The Power of FAN Tokens in Film.io’s Ecosystem

October 19, 2023

Type above and press Enter to search. Press Esc to cancel.