23andMe 证实黑客窃取了 690 万用户的祖先数据
23andMe confirms hackers stole ancestry data on 6.9M users

原始链接: https://techcrunch.com/2023/12/04/23andme-confirms-hackers-stole-ancestry-data-on-6-9-million-users/

基因检测公司 23andMe 最近发布的一份声明显示,14,000 名客户的个人详细信息和血统数据在今年早些时候的一次网络攻击中被盗。 然而,该公司随后承认,由于 DNA 亲属服务共享功能的问题,超过 600 万客户的数据可能已被泄露。 除此之外,140万份家谱资料也可能遭到盗窃。 获得的信息可能包括客户的姓名、出生年份、关系标签、与他人共享的 DNA 百分比以及他们自我报告的位置等。 这些数字大大增加了之前对受影响用户的估计,并强调在共享此类敏感材料时需要对隐私问题保持高度警惕。

根据提供的文本,以下是有关最近 23andMe 黑客攻击的一些要点: - 黑客获取了数十万客户的个人详细信息和基因档案,包括全名、出生日期和电子邮件地址。 然而,23andMe 声称用户的密码仍然安全。 - 该攻击发生在该公司于 2016 年转向第三方云计算提供商之后。 - 用户报告收到电子邮件,表明他们的密码在登录后自动重置。然而,23andMe 坚称其系统保持完好,并暗示密码重置是通过旨在识别客户帐户可疑活动的工具触发的。 - 据 KrebsOnSecurity 称,攻击开始的时间早于最初披露的时间。 该公司在发布新闻稿宣布此次违规事件之前近三个月首次注意到异常活动的迹象。 - 撇开是否遵守特定的安全协议不谈,更广泛的问题仍然是,由于世界范围内的家庭和社区相互联系的程度,遗传数据本身往往不能简单地贴上“私人”标签。 此外,这些数据可能会泄露敏感的健康信息,具体取决于分析方式。 - 一些评论员认为,这次袭击的潜在后果可能会对社会的许多方面产生负面影响,从社会耻辱和政治两极分化到就业前景和人寿保险费。 - 隐私倡导者提出的一个主要问题是,鉴于这种敏感的基因数据在跨国界和各大洲的各个亚群体和家庭分支之间明显易于传播和传播,是否可以在法律上将其视为“公共领域”。 另一个关键问题涉及谁最终拥有和控制这一庞大的消费者基因组数据,特别是在企业、政府和其他实体应在多大程度上出于表面上的善意目的(例如科学发现和疾病诊断)而访问这些数据方面。 最后,随着人们越来越认识到特定疾病与某些环境因素之间的长期联系,一个紧迫的问题出现了,即消费者在多大程度上可能因接触与他们度过了重要时光的特定地点相关的毒素而承担经济责任或受到处罚。 中的时间量。
相关文章

原文

On Friday, genetic testing company 23andMe announced that hackers accessed the personal data of 0.1% of customers, or about 14,000 individuals. The company also said that by accessing those accounts, hackers were also able to access “a significant number of files containing profile information about other users’ ancestry.” But 23andMe would not say how many “other users” were impacted by the breach that the company initially disclosed in early October.

As it turns out, there were a lot of “other users” who were victims of this data breach: 6.9 million affected individuals in total.

In an email sent to TechCrunch late on Saturday, 23andMe spokesperson Katie Watson confirmed that hackers accessed the personal information of about 5.5 million people who opted-in to 23andMe’s DNA Relatives feature, which allows customers to automatically share some of their data with others. The stolen data included the person’s name, birth year, relationship labels, the percentage of DNA shared with relatives, ancestry reports and self-reported location.

23andMe also confirmed that another group of about 1.4 million people who opted-in to DNA Relatives also “had their Family Tree profile information accessed,” which includes display names, relationship labels, birth year, self-reported location and whether the user decided to share their information, the spokesperson said. (23andMe declared part of its email as “on background,” which requires that both parties agree to the terms in advance. TechCrunch is printing the reply as we were given no opportunity to reject the terms.)

It is also not known why 23andMe did not share these numbers in its disclosure on Friday.

Considering the new numbers, in reality, the data breach is known to affect roughly half of 23andMe’s total reported 14 million customers.

In early October, a hacker claimed to have stolen the DNA information of 23andMe users in a post on a well-known hacking forum. As proof of the breach, the hacker published the alleged data of one million users of Jewish Ashkenazi descent and 100,000 Chinese users, asking would-be buyers for $1 to $10 for the data per individual account. Two weeks later, the same hacker advertised the alleged records of another four million people on the same hacking forum.

TechCrunch found that another hacker on a separate hacking forum had already advertised a batch of allegedly stolen 23andMe customer data two months before the widely reported advertisement.

Contact Us

Do you have more information about the 23andMe incident? We’d love to hear from you. You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or email [email protected]. You also can contact TechCrunch via SecureDrop.

When we analyzed the months-old leaked data, TechCrunch found that some records matched genetic data published online by hobbyists and genealogists. The two sets of information were formatted differently, but contained some of the same unique user and generic data, suggesting the data leaked by the hacker was at least in part authentic 23andMe customer data.

In disclosing the incident in October, 23andMe said the data breach was caused by customers reusing passwords, which allowed hackers to brute-force the victims’ accounts by using publicly known passwords released in other companies’ data breaches.

Because of the way that the DNA Relatives feature matches users with their relatives, by hacking into one individual account, the hackers were able to see the personal data of both the account holder as well as their relatives, which magnified the total number of 23andMe victims.

Read more on TechCrunch:

联系我们 contact @ memedata.com