🚨BREAKING: Genetics firm 23andMe confirms user data theft in a credential stuffing attack.
The hackers released 1 million lines of data targeting Ashkenazi Jews.
23andMe, a renowned U.S. biotech & genomics firm, offers genetic testing services.
A threat actor recently leaked data samples from the firm and is now selling 23andMe customer data packs.
TARGETED LEAK: The initial data leak was limited but deeply concerning.
The threat actor released 1 million lines of data specifically for Ashkenazi people.
This targeted attack raises serious questions about the motive behind the breach.
On October 4, the hacker offered to sell data profiles in bulk, ranging from $1-$10 per 23andMe account, depending on the quantity purchased.
23andMe's RESPONSE: The company confirmed the data's legitimacy. They believe the hackers used credentials from other breaches to access 23andMe accounts.
"We do not have any indication at this time that there has been a data security incident within our systems."
The leaked data includes full names, usernames, profile photos, sex, date of birth, genetic ancestry results, and geographical location.
This is a goldmine for identity thieves and malicious actors.
The compromised accounts had opted into the platform's 'DNA Relatives' feature.
The hacker accessed a few 23andMe accounts and scraped the data of their DNA Relative matches, showing the potential risks of such features.
23andMe offers two-factor authentication and urges all users to enable it.
It's a reminder for everyone to refrain from reusing passwords and to always use strong, unique credentials.
FCC just voted 2-1 to eliminate cybersecurity requirements for telecom carriers, reversing rules adopted at the end of Biden admin.
The telecom industry successfully lobbied against the rules, claiming they were too burdensome and that voluntary cooperation works better
The decision undoes a declaratory ruling that stated the 1994 Communications Assistance for Law Enforcement Act (CALEA) requires telecoms to secure networks from unlawful access and interception.
Also eliminates proposed minimum security standards.
This comes months after Salt Typhoon, where Chinese APT penetrated multiple major US telecoms and accessed sensitive comms data.
Woah. Trenchant, who develops zero-days and surveillance tools for Five Eyes intelligence agencies (US, UK, Canada, Australia, and New Zealand). Has had an insider accused of selling secrets to Russia.
Former L3Harris/Trenchant GM Peter Williams charged with stealing trade secrets. DOJ claims he made $1.3M from the sale.
Timeline: Williams allegedly stole 7 trade secrets between Apr '22-Jun '25, and an 8th between Jun-Aug '25. He was Trenchant's GM from Oct '24 until Aug '25, operating out of DC.