By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
RebruitRebruitRebruit
  • Latest
  • Finance
  • Technology
  • Security
  • Guides
Reading: 23andMe Reports a Data Breach—About 14,000 Customer Accounts Compromised
Font ResizerAa
RebruitRebruit
Font ResizerAa
Search
  • Latest
  • Finance
  • Technology
  • Security
  • Guides
Follow US
  • About
  • Our Standards
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of use
© 2025 REBRUIT | We don’t control content on external sites. Read more about how we handle external links

Home » 23andMe Reports a Data Breach—About 14,000 Customer Accounts Compromised

Security

23andMe Reports a Data Breach—About 14,000 Customer Accounts Compromised

Beyond compromising individual accounts, the attackers leveraged 23andMe's DNA Relatives feature, allowing them to access the personal data of individuals connected to the initial victims.

rebruit icon
rebruit
December 1, 2023
Share
2 Min Read
23andMe
Image Credit: David Paul Morris/Getty Images
SHARE

Genetic testing company 23andMe recently reported a data breach, revealing that approximately 14,000 customer accounts were compromised. In a filing with the U.S. Securities and Exchange Commission, the company disclosed that hackers accessed 0.1% of its customer base, translating to around 14,000 individuals out of its 14 million global customers.

The breach not only exposed customer accounts but also granted unauthorized access to a considerable number of files containing profile information related to users’ ancestry who had opted into 23andMe’s DNA Relatives feature. The company, however, did not specify the exact number of affected files or the extent of impact on these users.

The breach, attributed to the common technique of “credential stuffing,” allowed cybercriminals to exploit known passwords, potentially leaked from other services. Beyond compromising individual accounts, the attackers leveraged 23andMe’s DNA Relatives feature, allowing them to access the personal data of individuals connected to the initial victims.

For the 14,000 affected users, the stolen data generally included ancestry information, and for a subset of accounts, health-related information based on genetic data. Another subset had unspecified “profile information” exposed, with certain details posted online.

The data breach was noticed when hackers advertised the data of one million users of Jewish Ashkenazi descent and 100,000 Chinese users on a hacking forum. Subsequently, the same hacker offered records of an additional four million people for sale, pricing them between $1 and $10 per victim.

Further investigation showed that another hacker had advertised stolen 23andMe user data two months before the initial report, claiming possession of 300 terabytes of data and seeking $50 million for the entire database or varying amounts for subsets.

In response to the breach, 23andMe implemented security measures, including password resets and the encouragement of multi-factor authentication in October. By November, the company mandated all users to enable two-step verification.

Share This Article
Facebook Whatsapp Whatsapp Bluesky Copy Link
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

ZKsync
ZKsync Account Hack: What Happened and What It Means
Security
Xperia 1 VII
Xperia 1 VII: Sony’s Most Creator-Focused Smartphone Yet
Latest
S25 Edge
The Galaxy S25 Edge is Here: Great Design, But Who Needs It?
Technology
Nvidia’s New H20 Chip for China Is a Tactical Workaround to U.S. Sanctions
Nvidia’s New H20 Chip for China Is a Tactical Workaround to U.S. Sanctions
Technology
Apple’s AI Search Move Could Cost Google Billions
Apple’s AI Search Move Could Cost Google Billions
Latest

You Might Also Like

M&S Cyber Attack
Security

How Hackers Broke Into M&S and Co-op: It Wasn’t a Glitch — It Was Human Error

May 6, 2025
Marks-and-Spencer-cyber-attack
Security

M&S cyberattack: Recruitment paused and supply issues reported

May 1, 2025
M&S Pause Online order
Security

M&S pauses all online orders after cyber attack

May 1, 2025
M&S Attack
Security

M&S confirms cyberattack after days of disruption

May 1, 2025
23andMe
Security

23andMe Bankruptcy Raises Serious DNA Privacy Concerns

April 21, 2025
Google Play
Security

New Google Play system update now force your phone to auto-reboot after three days

April 22, 2025
Global Cybersecurity Agencies Uncover Spyware Hidden in Android Apps
Security

Global Cybersecurity Agencies Uncover Spyware Hidden in Android Apps

April 24, 2025
UK Government Fails in Attempt to Shield Apple Surveillance Order from Public Eye
Security

UK Government Fails in Attempt to Shield Apple Surveillance Order from Public Eye

April 24, 2025
Follow US
© 2025 REBRUIT | We don’t control content on external sites. Read more about how we handle external links
  • About
  • Our Standards
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of use
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?