this post was submitted on 26 Jan 2024
324 points (98.5% liked)

Technology

59390 readers
4323 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
all 17 comments
sorted by: hot top controversial new old
[–] [email protected] 19 points 9 months ago* (last edited 9 months ago) (2 children)

I kept my DNA out of those services, because they felt like they were on the "socks-for-cats dot com" side of the internet hosting maturity scale...

I hate being right. Maybe I'm being unfair, but I'm glad I waited.

Edit: At least it's not as stupid as someone emailed an excel sheet or left an admin password set to "princess".

In my opinion, we need much higher security standards for companies that track ancestry or DNA data, because there are active fascists out there willing to pay a premium for that data. And we need to not let that happen again. https://en.m.wikipedia.org/wiki/IBM_and_the_Holocaust

Edit 2:

Fuck. I hate being right.

https://techcrunch.com/2023/12/04/23andme-confirms-hackers-stole-ancestry-data-on-6-9-million-users/

"In early October, a hacker claimed to have stolen the DNA information of 23andMe users in a post on a well-known hacking forum. As proof of the breach, the hacker published the alleged data of one million users of Jewish Ashkenazi descent and 100,000 Chinese users, asking would-be buyers for $1 to $10 for the data per individual account."

[–] [email protected] 6 points 9 months ago

Once bitten twice shy. Except some people refuse to learn entirely so be glad that your attitude allows you to not fall into that camp.

[–] [email protected] 6 points 9 months ago

If any of your close relatives submitted their dna, you're in there too

[–] [email protected] 2 points 9 months ago (2 children)

Brute force attacks on a huge number of accounts on an online site?

[–] [email protected] 14 points 9 months ago* (last edited 9 months ago)

Credential stuffing using botnets spread over months. It would look almost identical to legit login requests.

[–] [email protected] 2 points 9 months ago

This is the best summary I could come up with:


In a data breach notification letter filed with regulators this weekend, 23andMe revealed that hackers started breaking into customers’ accounts in April 2023 and continued through most of September.

In other words, for around five months, 23andMe did not detect a series of cyberattacks where hackers were trying — and often succeeding — in brute-forcing access to customers’ accounts, according to a legally required filing 23andMe sent to California’s attorney general.

According to the company, 23andMe became aware of the breach in October when hackers advertised the stolen data in posts published on the unofficial 23andMe subreddit and separately on a notorious hacking forum.

The stolen data included the person’s name, birth year, relationship labels, the percentage of DNA shared with relatives, ancestry reports and self-reported location.

Data breach lawyers called the terms of service changes “cynical,” “self-serving,” and “a desperate attempt” to protect 23andMe against its own customers.

“Users negligently recycled and failed to update their passwords following these past security incidents, which are unrelated to 23andMe,” 23andMe claimed in a letter to breach victims.


The original article contains 400 words, the summary contains 176 words. Saved 56%. I'm a bot and I'm open source!