23andMe Data Breach Implications and the Continued Fallout
Nathan E Botts
/ Categories: Security

23andMe Data Breach Implications and the Continued Fallout

What to consider if you shared your DNA data

Genetic profiling company 23andMe is currently investigating a data scraping incident where private user information was stolen from its website. The confirmation came five days after an undisclosed entity advertised the sale of private data of millions of 23andMe users on an online crime forum. The alleged stolen data included details like origin estimation, phenotype, health records, photographs, and other identification data. Speculation arose that the CEO of 23andMe knew about this breach two months prior and had kept it under wraps. However, in response, a representative of the company contested that there's no proof of 'health information' being part of the posted data and currently, these are just unverified claims.

Recent updates have identified further fallout of the 23andMe breach. A spokesperson for 23andMe, Katie Watson, informed TechCrunch that hackers accessed the personal data of approximately 5.5 million customers who use the DNA Relatives feature. This feature allows users to share some of their genetic data with others. The compromised data includes names, birth years, relationship labels, the percentage of DNA shared with relatives, ancestry reports, and self-reported locations.

Additionally, another group of about 1.4 million people who opted into DNA Relatives had their Family Tree profile information accessed. This includes display names, relationship labels, birth years, self-reported locations, and information on whether they chose to share their data. 23andMe had declared part of its email as "on background," meaning both parties must agree to the terms in advance. TechCrunch published the reply as they were not given an opportunity to reject these terms.

The breach was attributed to data scraping, a method where attackers systematically extract smaller bits of information available to individual users, ultimately compiling large volumes of data. The attackers had unauthorized access to specific 23andMe accounts, which had the DNA relative feature activated. This feature lets users find potential relatives by viewing the basic profile details of others who have also opted into the feature. Officials from 23andMe emphasized that there isn’t any evidence suggesting a direct breach in their security systems. Instead, they suspect the login credentials might have been gathered from data leaks from other platforms where users reused their passwords. It was highlighted that the attackers have, in all likelihood, violated the company’s terms of service. Reports have emerged claiming that the data dump consists of 13 million pieces of information, with specifics regarding the nature and number of affected users still undisclosed. However, notable mentions include a leaked database of 1 million users of Ashkenazi descent and another 300,000 users of Chinese descent, all of whom had activated the DNA relative feature.

Recent events highlight the inherent risks associated with storing genetic data online. In 2018, another genetic data company, MyHeritage, faced a breach where over 92 million users' email addresses and passwords were compromised. The same year, officials in California utilized a different genealogy site, GEDMatch, to locate a suspect related to murders that had taken place 40 years prior. The suspect was identified not through his DNA but a relative's who had submitted a sample to GEDMatch. Storing genetic information online offers benefits like tracing lineage and finding relatives, but it also poses significant privacy threats. Even with strong passwords and two-factor authentication, as advocated by 23andMe, users' data remains vulnerable. The only foolproof way to safeguard it from online theft is to avoid online storage altogether.

SOAP Notes on what to consider about the 23andMe breach: Subjective, Objective, Assessment, and Plan

Subjective (Patient's feelings, history, complaints, etc.):

  • Concerns about the safety and security of storing genetic information online.
  • Anecdotal mentions of past breaches affecting other users.

 

Objective (Factual, measurable data):

  • 23andMe confirmed a data scraping incident involving private user data.
  • Unknown entity advertised the sale of millions of 23andMe user data.
  • Data purportedly includes origin estimation, phenotype, health records, photos, and identification.
  • Attackers gained unauthorized access using the DNA relative feature.
  • There are claims of around 13 million pieces of data being stolen.
  • In 2018, MyHeritage reported a breach affecting 92 million users.
  • Law enforcement officials have previously used genealogy sites for investigations.

 

Assessment (Professional's judgment based on the above two):

  • DNA testing platforms, while beneficial for tracing lineage and identifying relatives, carry inherent risks regarding user data privacy.
  • Even with advanced security features, such as strong passwords and two-factor authentication, vulnerabilities still exist.
  • External breaches (as seen in other online platforms where users recycle passwords) can indirectly compromise security in DNA testing platforms.

 

Plan (Recommendations or future plans):

  • Users should exercise caution when deciding to store genetic information online.
  • Always use unique, strong passwords for each online platform and avoid reusing passwords across platforms.
  • Frequently review and update security settings on DNA testing platforms.
  • Remain informed and periodically check the privacy policies and terms of service of these companies.
  • Consider the benefits against potential risks before opting into additional features like the DNA relative feature.
  • If possible, avoid online storage of critical genetic information altogether.

 

 

Previous Article Protecting Personal Health Information on Your Apple iPhone
Next Article Navigating the Complexities of HIPAA and Personal Health Data Security
Print
1018 Rate this article:
5.0
2Upvote 0Downvote
Please login or register to post comments.

How to Protect Your Privacy as More Apps Harvest Your Data

A New York Times Personal Tech series article by Brian X. Chen

Retrieved By Health eConsultation 0 14831 Article rating: 5.0

In this article written by Brian X. Chen from the New York Times he discusses some of the potential ways in which mobile apps that you download to your phone may be collecting and using your personal data in ways you did not know.

One of the key takeaways is that there are ways in which to protect yourself and tools that can help you figure out which apps are collecting your data and how to remove their ability to do so.

Stay Private: How to Hide Your Webcam, Mute Your Mic, and Turn Off Notifications

An article from Zapier

Nathan E Botts 0 14842 Article rating: 5.0

One consideration as you gather and store more personal health information on your computer and devices is making sure that you are not inadvertently sharing this information (or some other aspect of your personal health) through your webcam or mic.

This article from Zapier outlines several different ways and some handy applications that can help you control this on your PC or MAC.

Determining the Value of Compromising Your Privacy

An article from Engadget

Nathan E Botts 0 9939 Article rating: No rating

This article from the Engadget web magazine discusses how your online searching behaviors might be monitored by different companies that you are unaware about. This data is likely used to build profiles that may impact the advertisements you see, credit ratings received, and other potential social network aspects as of yet identified. 

Cybersecurity: Crash Course Computer Science #31

Retrieved By Health eConsultation 0 14452 Article rating: No rating

Cybersecurity: Crash Course Computer Science #31Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe. Check out Computerphile’s wonderful video on how to choose a password! https://www.youtube.com/watch?v=3NjQ9b3pgIg Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here! https://store.dftba.com/products/computer-science-coasters Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios Want to know more about Carrie Anne? https://about.me/carrieannephilbin The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV Want to find Crash Course elsewhere on the internet? Facebook - https://www.facebook.com/YouTubeCrash... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids

RSS

What is Health eDefense?

Health eDefense is the act of protecting your personal health information. This not only protects your privacy, security, and safety, but also protects the data of your family, friends, and others in your community.

The Health eDefense platform is dedicated to providing consumers with actionable information on how to protect their personal health information effectively from cyber threats. Health eDefense provides informational content and education related to cyber security, privacy and consent, security, and related topics and policies such as HIPAA and GDPR.

Cyber security is impacting our daily lives, and our personal and protected health information is a target for hackers and criminals looking to make money off of our personal data. Your personal health data will always be about your health, demographics, social, lifestyle, financial history, and other related details. Once taken, they cannot be taken back.

We think the best cybersecurity tool is education and awareness, and we hope to provide users with tools and insight to protect themselves and their data better.