{"id":55350,"date":"2024-02-16T14:53:21","date_gmt":"2024-02-16T14:53:21","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35547\/Hackers-Got-Nearly-7-Million-Peoples-Data-From-23andMe.html"},"modified":"2024-02-16T14:53:21","modified_gmt":"2024-02-16T14:53:21","slug":"hackers-got-nearly-7-million-peoples-data-from-23andme","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/","title":{"rendered":"Hackers Got Nearly 7 Million People&#8217;s Data From 23andMe"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.guim.co.uk\/img\/media\/7b43c171fd1cdb5415de9736a5b94f3f552107d1\/0_125_3744_2246\/master\/3744.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=59aa681bd19a94835d1a4d3954349e3f\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"dcr-4cudl2\"><span class=\"dcr-1ipjagz\">T<\/span>hree years ago, a man in Florida named JL decided, on a whim, to send a tube of his spit to the genetic testing site 23andMe in exchange for an ancestry report. JL, like millions of other 23andMe participants before him, says he was often asked about his ethnicity and craved a deeper insight into his identity. He said he was surprised by the diversity of his test results, which showed he had some Ashkenazi Jewish heritage.<\/p>\n<p class=\"dcr-4cudl2\">JL said he didn\u2019t think much about the results until he learned of a <a href=\"https:\/\/www.theguardian.com\/technology\/2023\/dec\/05\/23andme-hack-data-breach\" data-link-name=\"in body link\">huge breach at the company that exposed the data of nearly 7 million people<\/a>, about half of the company\u2019s customers. Worse, he later learned of a hacker going by the pseudonym \u201cGolem\u201d who had <a href=\"https:\/\/www.nytimes.com\/2024\/01\/26\/business\/23andme-hack-data.html\" data-link-name=\"in body link\">offered to sell the names, addresses and genetic heritage<\/a> reportedly belonging to 1 million 23andMe customers with similar Ashkenazi Jewish heritage on a shadowy dark web forum. Suddenly, JL worried his own flippant decision to catalog his genes could put him and his family at risk.<\/p>\n<figure id=\"9049cc3b-88a9-401a-97ae-c3ed5f772a70\" data-spacefinder-role=\"richLink\" data-spacefinder-type=\"model.dotcomrendering.pageElements.RichLinkBlockElement\" class=\" dcr-1your1i\"><gu-island name=\"RichLinkComponent\" priority=\"feature\" deferuntil=\"idle\" props=\"{&quot;richLinkIndex&quot;:2,&quot;element&quot;:{&quot;_type&quot;:&quot;model.dotcomrendering.pageElements.RichLinkBlockElement&quot;,&quot;prefix&quot;:&quot;Related: &quot;,&quot;text&quot;:&quot;Genetic testing firm 23andMe admits hackers accessed DNA data of 7m users&quot;,&quot;elementId&quot;:&quot;9049cc3b-88a9-401a-97ae-c3ed5f772a70&quot;,&quot;role&quot;:&quot;richLink&quot;,&quot;url&quot;:&quot;https:\/\/www.theguardian.com\/technology\/2023\/dec\/05\/23andme-hack-data-breach&quot;},&quot;ajaxUrl&quot;:&quot;https:\/\/api.nextgen.guardianapps.co.uk&quot;,&quot;format&quot;:{&quot;display&quot;:0,&quot;theme&quot;:0,&quot;design&quot;:10}}\" config=\"{&quot;renderingTarget&quot;:&quot;Web&quot;,&quot;darkModeAvailable&quot;:false}\"><\/gu-island><\/figure>\n<p class=\"dcr-4cudl2\">\u201cI didn\u2019t know my family was going to potentially be a target,\u201d he said. \u201cI may have put my family and myself in danger for something I did out of curiosity more than anything.\u201d<\/p>\n<p class=\"dcr-4cudl2\">JL, who asked to only be identified by his initials due to the ongoing privacy issues, is one of two plaintiffs listed in a recent class-action lawsuit filed in California against 23andMe. Plaintiffs claim the company failed to adequately notify users of Jewish and Chinese heritage after they were allegedly targeted. The lawsuit claims hackers placed those users in \u201cspecially curated lists\u201d that could have been sold to individuals looking to do harm.<\/p>\n<p class=\"dcr-4cudl2\">23andMe has since confirmed hackers gained access to 14,000 user accounts over a span of five months last year, some of which <a href=\"https:\/\/techcrunch.com\/2024\/01\/25\/23andme-admits-it-didnt-detect-cyberattacks-for-months\/\" data-link-name=\"in body link\">revealed detailed, sensitive reports on users\u2019 health<\/a>. The company revealed details on the exact types of data stolen in its months-long breach in a January data <a href=\"https:\/\/oag.ca.gov\/ecrime\/databreach\/reports\/sb24-579679\" data-link-name=\"in body link\">breach notification letter sent<\/a> to California\u2019s attorney general earlier last month. Hackers accessed users\u2019 \u201cuninterrupted raw genotype data\u201d and other highly sensitive information, like health predisposition reports and carrier-status reports gleaned from the processing of a user\u2019s genetic information. Worse still, 23andMe confirmed the thieves also accessed other personal information from up to 5.5 million people who opted in to a feature that lets them find and connect with genetic relatives.<\/p>\n<p class=\"dcr-4cudl2\">23andMe only <a href=\"https:\/\/www.reuters.com\/world\/us\/23andme-notifies-customers-data-breach-into-its-dna-relatives-feature-2023-10-24\/\" data-link-name=\"in body link\">publicly acknowledged<\/a> the hackers\u2019 attacks after one user posted about the up-for-sale data on a 23andMe subreddit in early October. An investigation digging into the incident revealed hackers had actually been trying, sometimes successfully, to gain access since at least April 2023. The attacks had continued for nearly five months through the end of September. In an email sent to the Guardian, a 23andMe spokesperson said the company did not \u201cdetect a breach\u201d within 23andMe systems and instead attributed the incident to compromised recycled login credentials from certain users.<\/p>\n<p class=\"dcr-4cudl2\">A far larger subsection of users had other, potentially less sensitive data exposed through 23andMe\u2019s opt-in <a href=\"https:\/\/customercare.23andme.com\/hc\/en-us\/articles\/212170838-DNA-Relatives-Privacy-Display-Settings#:~:text=The%20DNA%20Relatives%20feature%20is,opt%20in%20to%20the%20feature.\" data-link-name=\"in body link\">DNA relatives feature<\/a>, which automatically lets the company share data between other users on the platform who they may be related to. In other words, hackers who gained access to a user\u2019s account via the compromised passwords were also able to suck up data about potential relatives. The optional feature gives users insight into a variety of data points, including their relatives\u2019 name, their predicted relationship, and the percentage of DNA shared with matches. It can also include an individual ancestry report, matching DNA segments, and uploaded photos.<\/p>\n<p class=\"dcr-4cudl2\">Eli Wade-Scott, one of the attorneys representing JL in the class-action lawsuit, said these allegedly ethnicity-specific groupings could amount to a \u201chit list\u201d. Jay Edelson, another attorney representing those users, worried those lists of users could look attractive to terrorists looking to identify people of Jewish heritage. He also said Chinese intelligence agencies, which have a history of <a href=\"https:\/\/www.pbs.org\/newshour\/show\/china-scrutinized-for-secret-police-watching-and-intimidating-chinese-dissidents-abroad\" data-link-name=\"in body link\">surveilling and intimidating dissidents abroad<\/a>, could use the data to target people critical of the government or even nation states.<\/p>\n<aside class=\"dcr-n0xy0n\"><svg viewBox=\"0 0 22 14\" class=\"dcr-scql1j\"><path d=\"M5.255 0h4.75c-.572 4.53-1.077 8.972-1.297 13.941H0C.792 9.104 2.44 4.53 5.255 0Zm11.061 0H21c-.506 4.53-1.077 8.972-1.297 13.941h-8.686c.902-4.837 2.485-9.411 5.3-13.941Z\" \/><\/svg><\/p>\n<blockquote class=\"dcr-zzndwp\"><p>This is a total paradigm shift when it comes to the implications of a data breach<\/p><\/blockquote>\n<footer><cite>Jay Edelson<\/cite><\/footer>\n<\/aside>\n<p class=\"dcr-4cudl2\">\u201cThis is a total paradigm shift when it comes to the implications of a data breach,\u201d Edelson added.<\/p>\n<p class=\"dcr-4cudl2\">Months after it first became aware of the beach, 23andMe sent a <a href=\"https:\/\/www.documentcloud.org\/documents\/24252535-response-letter-to-tycko-zavareei-llp\" data-link-name=\"in body link\">letter to several customers taking legal action against the company<\/a>. The company defended itself by saying there was no way the breach could lead to real-world problems: \u201cThe information that was potentially accessed cannot be used for any harm.\u201d It also cast blame for the hack on users who \u201cnegligently recycled and failed to update their passwords\u201d. Cybersecurity professionals refer to the weaponization of these repeated digital keys as \u201c<a href=\"https:\/\/www.theguardian.com\/technology\/2022\/mar\/19\/not-using-password-manager-why-you-should-online-security\" data-link-name=\"in body link\">credential stuffing<\/a>\u201d attacks.<\/p>\n<p class=\"dcr-4cudl2\">\u201cTherefore,\u201d 23andMe concluded, \u201cthe incident was not a result of 23andMe\u2019s alleged failure to maintain reasonable security measures.\u201d<\/p>\n<p class=\"dcr-4cudl2\">But multiple attorneys and genetic privacy experts say the company should have seen such an attack coming and done far more to safeguard this highly sensitive, intimate data. \u201cYou shouldn\u2019t be able to do an attack like this over the course of months and have nobody at 23andMe notice,\u201d said Wade-Scott.<\/p>\n<p class=\"dcr-4cudl2\">Barbara Prainsack, a University of Vienna professor for comparative policy, was herself a 23andMe customer. She said the company had a long time to protect itself and to establish data breach protocols. 23andMe, she said, seemed to have done neither: \u201cThis is almost a textbook case of how things should not be done.\u201d<\/p>\n<p class=\"dcr-4cudl2\">She added that blaming consumers for their own relatively minor security lapses is \u201cmorally and politically very dumb\u201d.<\/p>\n<p class=\"dcr-4cudl2\">23andMe users <a href=\"https:\/\/www.wired.com\/story\/23andme-blames-users-data-breach-security-roundup\/\" data-link-name=\"in body link\">suing the company for negligence seem to agree<\/a>. They say they never would have bought the company\u2019s kits had they known how lax its security was. Since the breach, more <a href=\"https:\/\/www.wired.com\/story\/23andme-blames-users-data-breach-security-roundup\/\" data-link-name=\"in body link\">than two dozen 23andMe users have brought forward individual and class-action lawsuits<\/a> accusing the company of negligence and invasion of privacy. The specifics of each of the lawsuits vary, but each argues the company failed to \u201cimplement and maintain adequate security measures\u201d.<\/p>\n<p class=\"dcr-4cudl2\">\u201c23andMe lied to customers about how it would protect their data, failed to reasonably protect their data in accordance with industry standards, lied about the scope and severity of the breach, failed to notify its Jewish and Chinese customers that they were specifically targeted, and in the end, exposed them to a host of threats and dangers that they\u2019ll never see coming,\u201d JL\u2019s suit reads.<\/p>\n<figure id=\"cc4edf4b-bdcc-4bab-bef4-9d370200d76f\" data-spacefinder-role=\"richLink\" data-spacefinder-type=\"model.dotcomrendering.pageElements.RichLinkBlockElement\" class=\" dcr-1your1i\"><gu-island name=\"RichLinkComponent\" priority=\"feature\" deferuntil=\"idle\" props=\"{&quot;richLinkIndex&quot;:18,&quot;element&quot;:{&quot;_type&quot;:&quot;model.dotcomrendering.pageElements.RichLinkBlockElement&quot;,&quot;prefix&quot;:&quot;Related: &quot;,&quot;text&quot;:&quot;Chinese hackers infiltrated plane, train and water systems for five years, US says&quot;,&quot;elementId&quot;:&quot;cc4edf4b-bdcc-4bab-bef4-9d370200d76f&quot;,&quot;role&quot;:&quot;richLink&quot;,&quot;url&quot;:&quot;https:\/\/www.theguardian.com\/technology\/2024\/feb\/08\/chinese-hack-us-transportation-infrastructure&quot;},&quot;ajaxUrl&quot;:&quot;https:\/\/api.nextgen.guardianapps.co.uk&quot;,&quot;format&quot;:{&quot;display&quot;:0,&quot;theme&quot;:0,&quot;design&quot;:10}}\" config=\"{&quot;renderingTarget&quot;:&quot;Web&quot;,&quot;darkModeAvailable&quot;:false}\"><\/gu-island><\/figure>\n<p class=\"dcr-4cudl2\">The slow-burning data breach scandal adds insult to injury to a company that has precipitously fallen from the highest rungs of Silicon Valley exceptionalism in recent years. The company went public in 2021 at a value of $3.5bn; now it is worth roughly $300m, a decline of 91%. 23andMe has never turned profit in its 18-year history. It may run out of cash by 2025. In only a few short years, the company that once seemed destined to become the \u201c<a href=\"https:\/\/nymag.com\/news\/features\/23andme-2014-4\/\" data-link-name=\"in body link\">Google of spit<\/a>\u201d is struggling to remain on the Nasdaq in spite of co-founder and CEO Anne Wojcicki\u2019s repeated attempts to quell investors\u2019 concerns.<\/p>\n<p class=\"dcr-4cudl2\">Experts said the downstream consequences of hackers accessing breached genetic data remains largely hypothetical. Still, they warned a bad actor armed with this type of information and enough motivation could potentially use it to identify an individual or blackmail them by threatening to reveal even more sensitive information. The possible combination of data gleaned from the 23andMe breach with other personal information could result in sophisticated identity fraud.<\/p>\n<p class=\"dcr-4cudl2\">Murat Kantarcioglu, a professor of computer science at the University of Texas at Dallas said he could imagine a scenario where an attacker armed with data linking an individual to a previously unknown relative could blackmail them by threatening to make that connection public. Other data revealing a user\u2019s family history with mental health issues, Kantarcioglu said, could possibly be misused by an employer to pass over someone seeking a job or promotion.<\/p>\n<p class=\"dcr-4cudl2\">At the time of writing, 23andMe <a href=\"https:\/\/techcrunch.com\/2023\/11\/07\/23andme-ancestry-myheritage-two-factor-by-default\/amp\/\" data-link-name=\"in body link\">requires two-factor authentication by default<\/a> for all its users. That added layer of security, which critics had demanded for years, was only enabled by default after the breach. 23andMe says it also required all its customers to reset their passwords following the incident.<\/p>\n<p class=\"dcr-4cudl2\">Muddying matters even further, legal experts believe 23andMe recently made subtle changes to its terms of service making it more difficult for victims to join together to <a href=\"https:\/\/harvardlawreview.org\/print\/vol-136\/the-enforcement-opportunity-from-mass-arbitration-to-mass-organizing\/#:~:text=Mass%20arbitration%20is%20a%20strategy,weight%20of%20significant%20filing%20fees.\" data-link-name=\"in body link\">pursue mass arbitration lawsuits<\/a>, TechCrunch reported. Those changes reportedly came just two days before 23andMe officially disclosed the data breach. 23andMe denies accusations it altered its terms of service to dissuade lawsuits and has instead said it made the changes to <a href=\"https:\/\/www.axios.com\/2023\/12\/07\/23andme-terms-of-service-update-data-breach#\" data-link-name=\"in body link\">make resolutions for disputes occur faster<\/a>.<\/p>\n<p class=\"dcr-4cudl2\">\u201cCustomers continue to retain the right to seek public injunctive relief,\u201d a 23andMe spokesperson said in an email.<\/p>\n<p class=\"dcr-4cudl2\">\u201cIn the middle of the night, they [23andMe] changed their terms to game the system and make it basically impossible to bring any sort of large volume of arbitration,\u201d Edelson said. Cohen Milstead partner Doug McNamara described the maneuver as a \u201cdesperate attempt to dissuade and deter from suing [23andMe]\u201d in a December <a href=\"https:\/\/techcrunch.com\/2023\/12\/11\/23andme-changes-to-terms-of-service-are-cynical-and-self-serving-lawyers-say\/\" data-link-name=\"in body link\">interview<\/a> with TechCrunch.<\/p>\n<aside class=\"dcr-n0xy0n\"><svg viewBox=\"0 0 22 14\" class=\"dcr-scql1j\"><path d=\"M5.255 0h4.75c-.572 4.53-1.077 8.972-1.297 13.941H0C.792 9.104 2.44 4.53 5.255 0Zm11.061 0H21c-.506 4.53-1.077 8.972-1.297 13.941h-8.686c.902-4.837 2.485-9.411 5.3-13.941Z\" \/><\/svg><\/p>\n<blockquote class=\"dcr-zzndwp\"><p>The way that the information is being bought and sold, it\u2019s kind of Defcon One in the privacy world<\/p><\/blockquote>\n<footer><cite>Jay Edelson<\/cite><\/footer>\n<\/aside>\n<p class=\"dcr-4cudl2\">Nearly a year has passed since hackers first tried gaining access to 23andMe users\u2019 accounts, but the company\u2019s legal and regulatory worries are probably just beginning. Aside from the metastasizing lawsuits, lawmakers are getting involved. In January, New Jersey Democratic representative Josh Gottheimer <a href=\"https:\/\/gottheimer.house.gov\/posts\/release-gottheimer-calls-for-fbi-investigation-into-23andme-data-breach\" data-link-name=\"in body link\">wrote a letter to FBI director Christopher Wray<\/a> urging the agency to launch an investigation into the company to determine whether or not the exposed data could be used to target Jewish communities. That came on the <a href=\"https:\/\/www.azag.gov\/press-release\/attorney-general-mayes-demands-answers-23andme-data-breach#:~:text=PHOENIX%20%E2%80%93%20Last%20week,%20Attorney%20General,,%E2%80%9D%20said%20Attorney%20General%20Mayes.\" data-link-name=\"in body link\">heels of a letter sent to 23andMe<\/a> by Arizona attorney general Kris Mayes seeking additional data on the company\u2019s security protocols.<\/p>\n<p class=\"dcr-4cudl2\">Experts fear the ripple effects of the 23andMe breach could extend beyond the company itself. Prainsack worries anxiety stemming from the breach may make people less likely to share personal health data, not just with 23andMe, but more traditional doctors as well. That lack of trust could make it more difficult to properly treat patients.<\/p>\n<p class=\"dcr-4cudl2\">Kantarcioglu, from UT Dallas, said this probably wouldn\u2019t be the last data breach of its kind to affect genetic testing companies. \u201cYou have extremist groups calling for the death of Jews throughout the world, so it\u2019s hard to see how the stakes could be higher,\u201d Edelson, JL\u2019s attorney, said. \u201cThe way that the information is being bought and sold, it\u2019s kind of Defcon One in the privacy world.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35547\/Hackers-Got-Nearly-7-Million-Peoples-Data-From-23andMe.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[5810],"class_list":["post-55350","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackerprivacydata-losspassword"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Got Nearly 7 Million People&#039;s Data From 23andMe 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Got Nearly 7 Million People&#039;s Data From 23andMe 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-16T14:53:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/7b43c171fd1cdb5415de9736a5b94f3f552107d1\/0_125_3744_2246\/master\/3744.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=59aa681bd19a94835d1a4d3954349e3f\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hackers Got Nearly 7 Million People&#8217;s Data From 23andMe\",\"datePublished\":\"2024-02-16T14:53:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/\"},\"wordCount\":1781,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i.guim.co.uk\/img\/media\/7b43c171fd1cdb5415de9736a5b94f3f552107d1\/0_125_3744_2246\/master\/3744.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=59aa681bd19a94835d1a4d3954349e3f\",\"keywords\":[\"headline,hacker,privacy,data loss,password\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/\",\"name\":\"Hackers Got Nearly 7 Million People's Data From 23andMe 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i.guim.co.uk\/img\/media\/7b43c171fd1cdb5415de9736a5b94f3f552107d1\/0_125_3744_2246\/master\/3744.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=59aa681bd19a94835d1a4d3954349e3f\",\"datePublished\":\"2024-02-16T14:53:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#primaryimage\",\"url\":\"https:\/\/i.guim.co.uk\/img\/media\/7b43c171fd1cdb5415de9736a5b94f3f552107d1\/0_125_3744_2246\/master\/3744.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=59aa681bd19a94835d1a4d3954349e3f\",\"contentUrl\":\"https:\/\/i.guim.co.uk\/img\/media\/7b43c171fd1cdb5415de9736a5b94f3f552107d1\/0_125_3744_2246\/master\/3744.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=59aa681bd19a94835d1a4d3954349e3f\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,data loss,password\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacydata-losspassword\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hackers Got Nearly 7 Million People&#8217;s Data From 23andMe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Got Nearly 7 Million People's Data From 23andMe 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Got Nearly 7 Million People's Data From 23andMe 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-02-16T14:53:21+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/7b43c171fd1cdb5415de9736a5b94f3f552107d1\/0_125_3744_2246\/master\/3744.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=59aa681bd19a94835d1a4d3954349e3f","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hackers Got Nearly 7 Million People&#8217;s Data From 23andMe","datePublished":"2024-02-16T14:53:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/"},"wordCount":1781,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/7b43c171fd1cdb5415de9736a5b94f3f552107d1\/0_125_3744_2246\/master\/3744.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=59aa681bd19a94835d1a4d3954349e3f","keywords":["headline,hacker,privacy,data loss,password"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/","url":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/","name":"Hackers Got Nearly 7 Million People's Data From 23andMe 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/7b43c171fd1cdb5415de9736a5b94f3f552107d1\/0_125_3744_2246\/master\/3744.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=59aa681bd19a94835d1a4d3954349e3f","datePublished":"2024-02-16T14:53:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/7b43c171fd1cdb5415de9736a5b94f3f552107d1\/0_125_3744_2246\/master\/3744.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=59aa681bd19a94835d1a4d3954349e3f","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/7b43c171fd1cdb5415de9736a5b94f3f552107d1\/0_125_3744_2246\/master\/3744.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=59aa681bd19a94835d1a4d3954349e3f"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hackers-got-nearly-7-million-peoples-data-from-23andme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,data loss,password","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacydata-losspassword\/"},{"@type":"ListItem","position":3,"name":"Hackers Got Nearly 7 Million People&#8217;s Data From 23andMe"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55350"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55350\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}