Why Eric Swalwell's Sexual Misconduct Circus Is Heading to the Manhattan DA's Office
Eric Swalwell Responds to Sexual Assault Allegations in a New Video. It's Not...
Zohran Mamdani's Administration Just Had Its First Major Scandal
Nebraska's Court of Appeals Has a Chance to Cement Tough-on-Crime Sentencing. The Question...
USDA Fraud, Bank Scheme, and Stalking Land Iowa Farmer in Prison for 13...
Mamdani Just Took His Commie Jihad Against New Yorkers One Step Further
IBM to Pay $17M to Settle DEI Allegations
U.S. Military to Deploy Underwater Drones to Clear Mines in Strait of Hormuz
Chicago Man Charged With Threatening to 'Hunt' Secret Service Agent
Georgia Fraud Ring Allegedly Used 1,000+ Identities to Steal $7.6M of COVID Aid,...
Trump’s White House Ballroom Can Resume Construction, Court Rules
Peace Talks Have Reportedly Stalled Over Control of the Strait of Hormuz
U.S. Warships Enter the Strait of Hormuz For the First Time Since Operation...
Michigan Man Charged in Alleged $5M PPP Fraud Scheme
What This Kansas Democrat Posted Was Unbelievable...Almost
Tipsheet

Hackers Obtained Access to Millions of 23andMe Profiles, Company Says

Hackers Obtained Access to Millions of 23andMe Profiles, Company Says

Millions of users of the genetic testing company 23andMe had their personal information stolen by hackers, the company announced this month. 

In a U.S. Security and Exchange Commission disclosure dated December 1,  23andMe explained that on Oct. 1, a “threat actor” posted online that they had obtained users’ profile information (via SEC.gov):

Advertisement

Based on its investigation, 23andMe has determined that the threat actor was able to access a very small percentage (0.1%) of user accounts in instances where usernames and passwords that were used on the 23andMe website were the same as those used on other websites that had been previously compromised or were otherwise available

[...]

The information accessed by the threat actor in the Credential Stuffed Accounts varied by user account, and generally included ancestry information, and, for a subset of those accounts, health-related information based upon the user’s genetics. Using this access to the Credential Stuffed Accounts, the threat actor also accessed a significant number of files containing profile information about other users’ ancestry that such users chose to share when opting in to 23andMe’s DNA Relatives feature and posted certain information online. We are working to remove this information from the public domain. As of the filing date of this Amendment, the Company believes that the threat actor activity is contained.

According to multiple outlets, an estimated 6.9 million users were impacted in the breach. Reportedly, it began as thousands of users had their accounts hacked because their usernames and passwords corresponded with those on other websites that were compromised. From that point, about 5.5 million users had their data accessed from the company’s DNA Relatives feature. An additional 1.4 million users had their data breached through “family tree” profiles, a company spokesperson told The Hill

Advertisement

Related:

BIG TECH

Reportedly, Connecticut Attorney General William Tong previously alleged that individuals with Ashkenazi Jewish and Chinese heritage were targeted by the data breach.

In a letter to the company, Tong said that “the increased frequency of antisemitic and anti-Asian rhetoric and violence in recent years means that this may be a particularly dangerous time for such targeted information to be released to the public.”

Join the conversation as a VIP Member

Recommended

Trending on Townhall Videos

Advertisement
Advertisement
Advertisement