🚨BREAKING: Genetics firm 23andMe confirms user data theft in a credential stuffing attack.
The hackers released 1 million lines of data targeting Ashkenazi Jews.
23andMe, a renowned U.S. biotech & genomics firm, offers genetic testing services.
A threat actor recently leaked data samples from the firm and is now selling 23andMe customer data packs.
TARGETED LEAK: The initial data leak was limited but deeply concerning.
The threat actor released 1 million lines of data specifically for Ashkenazi people.
This targeted attack raises serious questions about the motive behind the breach.
On October 4, the hacker offered to sell data profiles in bulk, ranging from $1-$10 per 23andMe account, depending on the quantity purchased.
23andMe's RESPONSE: The company confirmed the data's legitimacy. They believe the hackers used credentials from other breaches to access 23andMe accounts.
"We do not have any indication at this time that there has been a data security incident within our systems."
The leaked data includes full names, usernames, profile photos, sex, date of birth, genetic ancestry results, and geographical location.
This is a goldmine for identity thieves and malicious actors.
The compromised accounts had opted into the platform's 'DNA Relatives' feature.
The hacker accessed a few 23andMe accounts and scraped the data of their DNA Relative matches, showing the potential risks of such features.
23andMe offers two-factor authentication and urges all users to enable it.
It's a reminder for everyone to refrain from reusing passwords and to always use strong, unique credentials.
Hackers claim to have compromised Gravy Analytics, exposing millions of smartphone location records—including data sold to U.S. government agencies.
This could be the first major breach of a location data broker. Here’s what you need to know 👇
Potential impact:
- Precise GPS coordinates + timestamps on millions of people
- User movement classifications ("LIKELY_DRIVING")
- Customer lists (Apple, Uber, Equifax & more)
- Root access to Gravy's servers, control of domains, and Amazon S3 buckets
For years, firms like Gravy have sold location data to military, DHS, and even the FBI. Now hackers claim to have access dating back to 2018.
Potential risks:
- De-anonymization of individuals
- Tracking high-risk people
- Exposure of schools, clinics, and more
(img: EFF)
New series of Palo Alto Networks vulnerabilities, chained together for a bad time.
“We find that a simple request to that exact endpoint over the web service resets the admin password.”
Well, I don’t like the sound of that… 🧵
First up -
CVE-2024-9464 is an OS command injection vulnerability in Palo Alto Networks Expedition
This allows an authenticated attacker to run arbitrary OS commands as root
Next -
CVE-2024-9465 is an SQL injection vulnerability in Palo Alto Networks Expedition
This allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys.
Woah. Millions of cars can be hacked just by knowing the license plate number.
This is done through a simple web app bug too, no complicated car hacking involved.
I also don't think it's fixed yet... 🧵
The bug seems to impact all Kias right now and the researchers didn't disclose a PoC since it isn't fixed but it's been 90 days since disclosure so they're talking about it.
With just a license plate number, they found a way to use the web portal that dealers and customers use to setup smart car features to ...do a lot more.
Including unlocking, tracking location, even starting the car.