Fri. Jul 5th, 2024

Hackers are selling the data of millions lifted from 23andMe’s genetic database<!-- wp:html --><p><a href="https://whatsnew2day.com/">WhatsNew2Day - Latest News And Breaking Headlines</a></p> <div> <p class="duet--article--dangerously-set-cms-markup duet--article--standard-paragraph mb-20 font-fkroman text-18 leading-160 -tracking-1 selection:bg-franklin-20 dark:text-white dark:selection:bg-blurple (&_a:hover):shadow-highlight-franklin dark:(&_a:hover):shadow-highlight-blurple (&_a):shadow-underline-black dark:(&_a):shadow-underline-white">23andMe acknowledged this week that user data from its genetic testing and analysis platform has been circulating on dark web forums after what it says was a credential stuffing attack. <a target="_blank" href="https://www.bleepingcomputer.com/news/security/genetics-firm-23andme-says-user-data-stolen-in-credential-stuffing-attack/" rel="noopener">according <em>beepcomputer</em></a>. The outlet wrote that a hacker reportedly leaked what he said was “1 million lines of data” to Ashkenazi Jews before saying he would sell the data he had stolen for between $1 and $10 per account. The data includes usernames, profile photos, genetic ancestry results, date of birth, and geographic location.</p> </div> <div> <p class="duet--article--dangerously-set-cms-markup duet--article--standard-paragraph mb-20 font-fkroman text-18 leading-160 -tracking-1 selection:bg-franklin-20 dark:text-white dark:selection:bg-blurple (&_a:hover):shadow-highlight-franklin dark:(&_a:hover):shadow-highlight-blurple (&_a):shadow-underline-black dark:(&_a):shadow-underline-white">In a statement provided to <em>beepcomputer</em>, the company confirmed that the data is legitimate, but says that the attackers had not breached its internal systems. According to the company, “preliminary results from this investigation suggest that the login credentials used in these access attempts may have been collected by a threat actor from data leaked during incidents involving other online platforms where users have recycled the login credentials.” <em>beepcomputer</em> reports that while the initial attack was based on passwords shared with accounts from previously compromised services, much of the leaked data was extracted from additional accounts using one of 23andMe’s own features, called ‘DNA Relatives’. </p> </div> <div> <p class="duet--article--dangerously-set-cms-markup duet--article--standard-paragraph mb-20 font-fkroman text-18 leading-160 -tracking-1 selection:bg-franklin-20 dark:text-white dark:selection:bg-blurple (&_a:hover):shadow-highlight-franklin dark:(&_a:hover):shadow-highlight-blurple (&_a):shadow-underline-black dark:(&_a):shadow-underline-white">There may be up to 7 million accounts for sale, <a target="_blank" href="https://www.pcmag.com/news/23andme-warns-of-hacker-breaking-into-user-accounts" rel="noopener"><em>PCMag </em>reported</a> on Wednesday, citing a <a target="_blank" href="https://x.com/DarkWebInformer/status/1709348139793068069?s=20" rel="noopener">Dark Web Informer post</a> who shared screenshots of another now-deleted hacker forum post. That’s about half of the total number of users on the 23andMe platform. <a target="_blank" href="https://arstechnica.com/security/2023/10/private-23andme-user-data-is-up-for-sale-after-online-scraping-spree/" rel="noopener">According <em>ArsTechnica</em></a><em>, </em>The hackers claimed that 23andMe’s CEO was aware of the leaked data two months earlier, but did not disclose the incident.</p> </div> <p><a href="https://whatsnew2day.com/hackers-are-selling-the-data-of-millions-lifted-from-23andmes-genetic-database/">Hackers are selling the data of millions lifted from 23andMe’s genetic database</a></p><!-- /wp:html -->

WhatsNew2Day – Latest News And Breaking Headlines

23andMe acknowledged this week that user data from its genetic testing and analysis platform has been circulating on dark web forums after what it says was a credential stuffing attack. according beepcomputer. The outlet wrote that a hacker reportedly leaked what he said was “1 million lines of data” to Ashkenazi Jews before saying he would sell the data he had stolen for between $1 and $10 per account. The data includes usernames, profile photos, genetic ancestry results, date of birth, and geographic location.

In a statement provided to beepcomputer, the company confirmed that the data is legitimate, but says that the attackers had not breached its internal systems. According to the company, “preliminary results from this investigation suggest that the login credentials used in these access attempts may have been collected by a threat actor from data leaked during incidents involving other online platforms where users have recycled the login credentials.” beepcomputer reports that while the initial attack was based on passwords shared with accounts from previously compromised services, much of the leaked data was extracted from additional accounts using one of 23andMe’s own features, called ‘DNA Relatives’.

There may be up to 7 million accounts for sale, PCMag reported on Wednesday, citing a Dark Web Informer post who shared screenshots of another now-deleted hacker forum post. That’s about half of the total number of users on the 23andMe platform. According ArsTechnica, The hackers claimed that 23andMe’s CEO was aware of the leaked data two months earlier, but did not disclose the incident.

Hackers are selling the data of millions lifted from 23andMe’s genetic database

By