黑客在网络安全论坛泄露数百万23andMe用户记录
Hacker leaks millions more 23andMe user records on cybercrime forum

原始链接: https://techcrunch.com/2023/10/18/hacker-leaks-millions-more-23andme-user-records-on-cybercrime-forum/

TechCrunch报道了一宗涉及基因和DNA检测服务提供商23andMe的数据泄露。名为“Golem”的黑客在10月初之前发布了数千名23andMe用户的数据后,发布了总计超过400万用户记录的第二数据集。新披露的信息包括姓名、出生日期和个人遗传信息等方面的详细信息,据称这些数据来自全球富裕地区的英国公民。根据这篇文章,这紧随该公司本月宣布的发现,即存在可能导致客户密码泄露的安全漏洞。尽管公司敦促立即更改密码并启用两步验证作为其推荐的补救措施,但关于攻击者采用的方法或这些步骤是否足以防止进一步泄露的信息仍然不清楚。目前,没有确凿的证据表明已经丢失的材料的具体范围或接下来将发生什么。然而,无论未知因素如何,TechCrunch都明确表示:“我们仍不知道这次[数据]泄露的全部范围。”

总体而言,23andMe在客户数据隐私和安全方面的处理似乎在预防措施和责任感方面存在不足。虽然有些人可能会认为,客户自己也有责任在网上存储他们的数据,但作为一个数据驱动的公司,有责任为客户的数据显示足够的安全协议。围绕HIPAA和遗传隐私法律的解释和应用产生的争论使问题变得更加复杂。此外,关于潜在地使用DNA数据进行针对性杀害或禁用个人的担忧,强调了不适当的隐私措施所带来的严重后果。总的来说,对客户数据隐私和安全的处理引发了关于专门从事获取和分发个人信息的公司的能力和意图的重大担忧,特别是与遗传隐私有关的问题。
相关文章

原文

The same hacker who leaked a trove of user data stolen from the genetic testing company 23andMe two weeks ago has now leaked millions of new user records.

On Tuesday, a hacker who goes by Golem published a new dataset of 23andMe user information containing records of four million users on the known cybercrime forum BreachForums. TechCrunch has found that some of the newly leaked stolen data matches known and public 23andMe user and genetic information.

Golem claimed the dataset contains information on people who come from Great Britain, including data from “the wealthiest people living in the U.S. and Western Europe on this list.”

23andMe spokesperson Andy Kill said in an emailed statement that the company was made aware of this new leak today, and that it is “reviewing the data to determine if it is legitimate.”

On October 6, 23andMe announced that hackers had obtained some user data, claiming that to amass the stolen data the hackers used credential stuffing — a common technique where hackers try combinations of usernames or emails and corresponding passwords that are already public from other data breaches.

Contact Us

Do you have more information about the 23andMe incident? We’d love to hear from you. You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or email [email protected]. You also can contact TechCrunch via SecureDrop.

In response to the incident, 23andMe prompted users to change their passwords and encouraged switching on multi-factor authentication. On its official page addressing the incident, 23andMe said it has launched an investigation with help from “third-party forensic experts.” 23andMe blamed the incident on its customers for reusing passwords, and an opt-in feature called DNA Relatives, which allows users to see the data of other opted-in users whose genetic data matches theirs. If a user had this feature turned on, in theory it would allow hackers to scrape data on more than one user by breaking into a single user’s account.

There are still a lot of unanswered questions about this incident. It’s not known if the hackers actually used credential stuffing and not another technique to steal the data, how much user data was stolen, and what the hackers intend to do with it.

The incident appears to have been conducted, or at least launched, several months ago. On August 11, a hacker on another cybercrime forum called Hydra advertised a set of 23andMe user data. That set of user data matched some of the user records leaked two weeks ago, according to a TechCrunch analysis.

On Hydra, the hacker claimed to have 300 terabytes of 23andMe user data, though the hacker did not provide any evidence for this claim.

Regardless of the many unanswered questions, what’s clear is that we still don’t know the full extent of this data leak. And it’s not clear that 23andMe knows yet how much data was taken.

UPDATE, October 18, 5:32 p.m. ET: This story was updated to include the statement from 23andMe’s spokesperson.

联系我们 contact @ memedata.com