Did Marjorie Taylor Greene Tip Off Leftists About Where Trump Was Eating...
The Washington Post's Pushed a Massive LIE About the ICE Shooting in Minneapolis
Did the Face of Somali Daycare Fraud in Minnesota Shut Down?
Hilton Hotel Worker in Texas Who Warned About ICE Presence on Social Media...
The Corporation for Public Broadcasting Is No More
Israeli Military Intelligence Gave a Shocking Update on the Iran Protests
America vs. F**K YOU!
You'll Never Guess Who This CNN Host Thinks the 'Actual Victims' of the...
Indiana Credit Union CEO Sentenced to Federal Prison in $285K Bank Fraud Scheme
Why Did Democrat Senator Ruben Gallego Just Lie About This ICE Officer?
Illegal Immigrant Used Stolen Identity to Vote in Multiple U.S. Elections, Feds Say
Detroit Teen Faces up to $5M Fine, 40 Years in Prison After Guilty...
The Portland Police Chief Is Shedding Tears for Venezuelan Gang Members Shot by...
A Judge Is Blocking Trump From Stopping Payments to Daycare Fraudsters
WHOOPS: Leftists Stage Massive Anti-ICE Protest Outside of the Wrong Hotel
Tipsheet

Hackers Obtained Access to Millions of 23andMe Profiles, Company Says

Millions of users of the genetic testing company 23andMe had their personal information stolen by hackers, the company announced this month. 

In a U.S. Security and Exchange Commission disclosure dated December 1,  23andMe explained that on Oct. 1, a “threat actor” posted online that they had obtained users’ profile information (via SEC.gov):

Advertisement

Based on its investigation, 23andMe has determined that the threat actor was able to access a very small percentage (0.1%) of user accounts in instances where usernames and passwords that were used on the 23andMe website were the same as those used on other websites that had been previously compromised or were otherwise available

[...]

The information accessed by the threat actor in the Credential Stuffed Accounts varied by user account, and generally included ancestry information, and, for a subset of those accounts, health-related information based upon the user’s genetics. Using this access to the Credential Stuffed Accounts, the threat actor also accessed a significant number of files containing profile information about other users’ ancestry that such users chose to share when opting in to 23andMe’s DNA Relatives feature and posted certain information online. We are working to remove this information from the public domain. As of the filing date of this Amendment, the Company believes that the threat actor activity is contained.

According to multiple outlets, an estimated 6.9 million users were impacted in the breach. Reportedly, it began as thousands of users had their accounts hacked because their usernames and passwords corresponded with those on other websites that were compromised. From that point, about 5.5 million users had their data accessed from the company’s DNA Relatives feature. An additional 1.4 million users had their data breached through “family tree” profiles, a company spokesperson told The Hill

Advertisement

Related:

BIG TECH

Reportedly, Connecticut Attorney General William Tong previously alleged that individuals with Ashkenazi Jewish and Chinese heritage were targeted by the data breach.

In a letter to the company, Tong said that “the increased frequency of antisemitic and anti-Asian rhetoric and violence in recent years means that this may be a particularly dangerous time for such targeted information to be released to the public.”

Join the conversation as a VIP Member

Recommended

Trending on Townhall Videos

Advertisement
Advertisement
Advertisement