Why the 23andMe Data Breach Is Such a Disaster

Why the 23andMe Data Breach Is Such a Disaster

Earlier this week, 23andMe admitted that an October hack was dramatically worse than the company initially admitted, affecting 6.9 million people, not the 14,000 it first reported. 23andMe followed up with an early Christmas present for users: a terms of service update that would force people to give up the right to sue the company. The stolen data includes full names, genetic information, and more, but despite the sensitivity of the information, some consumers responded with a shrug. As one TikTok user commented on a video about the subject, “What are they going to do, to clone me?”

Hackers probably won’t use your DNA information to make you a lab-grown baby brother, but experts agree: this hack is a catastrophe.

“The truth is that none of us fully know the implications of this breach today, only the certainty that it will grow worse over time,” said Albert Fox Cahn, Executive Director of the Surveillance Technology Oversight Project. “The ability to weaponize DNA data will only grow more acute as computers grow more powerful. From our health profiles to our family trees to far subtler details of our biology, this hack could potentially reveal so much.”

According to a 23andMe spokesperson, hackers stole data including people’s names, birth year, relationship labels, family name, and location. An additional 1.4 million people who opted-in to DNA Relatives also “had their Family Tree profile information accessed.” The worst, however, was the genetic info. Not only did hackers steal information about the percentage of DNA users shared with relatives, but 23andMe also leaked ancestry reports and matching DNA segments (specifically where on their chromosomes they and their relatives had matching DNA).

It seems this data is already up for sale. Wired reported in October that a user has advertised stolen 23andMe data on a well-known hacking forum around the time of the data breach. The user published the alleged data of one million users of Jewish Ashkenazi descent and 100,000 Chinese 23andMe users as proof, asking for $US1 to $US10 per person in the data set.

In general, companies have a legal obligation to protect their customers from data breaches. The 23andMe hack could expose the company to lawsuits, but its legal team issued a quick update to prevent that.

23andMe did not immediately respond to a request for comment.

The company published a terms of service update last week (coincidentally, around the time it notified the Securities and Exchange Commission of its hacking debacle). The policy update forces users into a binding arbitration, which is a means to resolve disputes outside of court, as first reported by Stack Diary. 23andMe specifically prohibits a class action lawsuit against the company unless each person opts out of the arbitration. If you’re an affected person, you can opt-out by emailing arbitrationoptout@23andme.com within 30 days, meaning Dec. 30. This detail is tucked at the bottom of the fifth section for its updated terms of service.

For many, it’s hard to grasp exactly why it matters that all this data is floating around on the internet. Hacks and breaches happen all the time, not to mention the trillions of data points companies like Google and Meta hoover up through more “legitimate” means.

The problem, experts say, is you rarely feel the consequences directly. Your personal information is used in complicated and obscure ways for all kinds of purposes behind closed doors. It has dramatic effects on your life, you just never know what data is responsible for any particular dilemma.

“Zooming out to the larger system of commercial profiling, it really does impact opportunity loss sometimes,” Suzanne Bernstein, a law fellow at the Electronic Privacy Information Center, told Gizmodo. “The data that’s collected from you determines what you are or aren’t offered. That can be something innocuous like which target ads you see or what email blasts you get, but it also enables discrimination.”

In the past, consumer data has been used to exclude certain demographics from job opportunities or vacant apartments. The personal information flying around the internet gets used in hiring decisions and credit applications, insurance companies even use it to set premiums. And, of course, the more detailed information criminals can dig up, the more likely you are to fall victim to identity theft.

Genetic information might seem disconnected from these problems, but it’s not.

You can’t change your genetic information, so it’s sensitive in and of itself, Bernstein said. “But it can also be used to make inferences about other health information, such as a diagnosis or medical family history,” she said. “There’s a serious risk of that becoming part of the profiling that happens in the broader ecosystem.”

And that only factors in the ways that we know DNA information can be used today. Gene science is a rapidly developing field. There’s no telling what this information could reveal in the future.

“Privacy and surveillance are heavily contextual, and as new genetic analysis, targeting, and surveillance technologies are developed, the context around genetic data privacy and surveillance will greatly change in ways that many people now cannot foresee,” said Justin Sherman a Senior Fellow at Duke’s Sanford School of Public Policy, and founder of Global Cyber Strategies.

23andMe stopped short of abdicating its responsibility altogether, but its public statements on the hack have an air of victim blaming. A spokesperson said the data breach resulted from people recycling passwords they had used on other accounts. Apparently, hackers used passwords that leaked elsewhere to break into 14,000 people’s accounts, a dead simple security breach known as credential stuffing.

Because 23andMe is designed as a data harvesting panopticon that pressures customers to share their data with everyone from other users to the company’s partners in the pharmaceutical industry, the hackers were able to use these 14,000 compromised accounts to steal information about millions of other people on the platform.

Reusing passwords is asking for trouble, but security professionals understand that bad password practices are a guarantee. According to experts, the 23andMe hack was easily preventable.

If nothing else, “It’s unacceptable that 23andMe neglected to require two-factor authentication (2FA) for account access,” said Patrick Jackson, Chief Technology Officer at Disconnect, a digital security company. “Attackers often target sites with sensitive data, like 23andMe, especially those without required 2FA, making them vulnerable to credential stuffing attacks.”


The Cheapest NBN 50 Plans

It’s the most popular NBN speed in Australia for a reason. Here are the cheapest plans available.

At Gizmodo, we independently select and write about stuff we love and think you'll like too. We have affiliate and advertising partnerships, which means we may collect a share of sales or other compensation from the links on this page. BTW – prices are accurate and items in stock at the time of posting.