Genetic testing supplier 23andMe confirmed that hackers stole well being stories and uncooked genotype information of consumers affected by a credential stuffing assault that went unnoticed for 5 months, from April 29 to September 27.
The credentials utilized by the attackers to breach the purchasers’ accounts had been stolen in different information breaches or used on beforehand compromised on-line platforms.
Because the genomics and biotechnology firm disclosed in information breach notification letters despatched to these impacted within the incident, a number of the stolen information was posted on the BreachForums hacking discussion board and the unofficial 23andMe subreddit web site.
The leaked data consists of the information for 1 million Ashkenazi Jews and 4.1 million individuals dwelling in the UK.

“Our investigation decided the menace actor downloaded or accessed your uninterrupted uncooked genotype information, and should have accessed different delicate data in your account, akin to sure well being stories derived from the processing of your genetic data, together with health-predisposition stories, wellness stories, and service standing stories,” 23andMe revealed.
“To the extent your account contained such data, the menace actor might have additionally accessed self-reported well being situation data, and knowledge in your settings.”
For purchasers who additionally used 23andMe’s DNA Family function, it’s potential that the attackers additionally scraped their DNA Family and Household Tree profile data.
They could have additionally gained visibility to affected prospects’ following data if shared by way of the DNA Family function:
- Ancestry stories and matching DNA segments (particularly the place in your chromosomes you and your relative had matching DNA),
- Self-reported location (metropolis/zip code),
- Ancestor start places and household names,
- Profile image, start 12 months, and the rest included of their profile’s “Introduce your self” part
23andMe informed BleepingComputer in December that the hackers downloaded the information of 6.9 million individuals of the prevailing 14 million prospects after breaching round 14,000 consumer accounts.
5.5 million people had their information scraped by way of the DNA Family function and 1.4 million by way of the Household Tree function.
On October 10, roughly one week after detecting the assault, 23andMe began requiring all prospects to reset their passwords.
Since November 6, all new and present prospects should use two-factor authentication when logging into their accounts to dam future credential-stuffing makes an attempt.
Final 12 months’s incident additionally resulted in a number of lawsuits being filed in opposition to 23andMe, inflicting the corporate to replace its Phrases of Use on November 30 with provisions that make it more durable for purchasers to affix class motion lawsuits in opposition to 23andMe.
“To the fullest extent allowed by relevant regulation, you and we agree that every social gathering might deliver disputes in opposition to the opposite social gathering solely in a person capability, and never as a category motion or collective motion or class arbitration,” reads one of many updates.
Nevertheless, 23andMe stated these adjustments had been added to make the arbitration course of extra environment friendly and simpler for purchasers to know.