23andMe users’ data leaked in dark web attack

23andMe, a genetic testing company, has announced that it believes some of its users’ data was compromised in a credential-stuffing attack. In a credential-stuffing attack, hackers use stolen usernames and passwords from other websites to gain access to user accounts on other websites.

The attacker behind the incident has leaked an initial sample of one million data points about users with Ashkenazi Jewish heritage to a popular hacking forum. The initial sample includes people’s full names, birth years, location information and more. The attacker also reportedly published a separate sample with information about more than 300,000 users with Chinese heritage earlier in the week.

23andMe believes that the attacker gained access to users’ accounts by reusing passwords stolen from breaches of other companies’ systems. This suggests that many of the affected users may have recycled their passwords across multiple websites.

A spokesperson from 23andMe affirmed their awareness of this threat actor’s actions, stressing their commitment to investigate further. They suspect that the attacker gained unauthorized access to accounts by exploiting reused passwords obtained from other security breaches.

23andMe asserts that there is currently no evidence of a security incident within their systems.

The sources for this piece include an article in Axios.

IT World Canada Staff
IT World Canada Staff
The online resource for Canadian Information Technology professionals.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

ITW in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

More Best of The Web