> series: anatomy_of_a_breach —— part: 178 —— target: 23andme —— accounts: 6,900,000 —— data: genetic_ancestry_family_relationships<span class="cursor-blink">_</span>_
In October 2023, 23andMe disclosed that attackers had used credential-stuffing — testing reused passwords from other breaches — to access approximately 14,000 customer accounts directly. But the true impact was far larger: the attackers used 23andMe's 'DNA Relatives' feature (which connects users with genetic matches) to scrape the ancestry and relationship data of approximately 6.9 million connected users who had opted in to the feature. The exposed data included ancestry reports, ethnicity percentage estimates, birth years, geographic locations, and family relationship connections.
The stolen data was initially posted on hacking forums — with some listings specifically targeting ethnic groups, raising concerns about the potential for ethnic profiling or discrimination using genetic data. 23andMe subsequently filed for bankruptcy in 2024, and the fate of its genetic database — containing the DNA data of approximately 15 million customers — raised additional concerns about what happens to sensitive genetic data when the company holding it ceases to exist. The breach proved that genetic data — the most personal, permanent, and immutable category of personal data — is subject to the same credential-stuffing vulnerabilities as any other online service.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe 23andMe breach proved that genetic data — despite being the most sensitive, permanent, and personal category of data — was protected by the same password-based authentication as any other consumer service, and was vulnerable to the same credential-stuffing attacks that have appeared in this series since 2016. Cyber Essentials mandates MFA. Our application testing assesses authentication controls and social feature amplification. SOC in a Box monitors for credential-stuffing patterns. And UK Cyber Defence provides incident response when sensitive data categories are compromised.
<a href="/cyber-essentials">Cyber Essentials</a> mandates MFA. <a href="/penetration-testing/web-application">Application testing</a> assesses authentication. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects credential stuffing.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call