23andMe Concludes Their Investigation – 6.9 Million Customers’ Data Exposed

On October 10th, 23andMe filed a document with the SEC stating that a “threat actor” (hacker) had accessed about 0.1% of their user accounts. That amounts to about 14,000 compromised users, according to their May 2023 earnings report where they state that they have about 14 million users. In addition, the hacker accessed their matches, and potentially matches of matches, through DNA Relatives.

I wrote about the initial compromise in three articles as information unfolded.

  1. 23andMe User Accounts Exposed – Change Your Password Now
  2. The 23andMe Data Exposure – New Info, Considerations and A Pause Strategy
  3. 23andMe: DNA Relatives, Connections, Event History Report and Other Security Tools

I expected that 23andMe would provide additional information directly to their customers as their investigation proceeded and concluded.

They have not published a new blog article nor notified customers directly.

They updated their original October 6th blog article on both December 1st and 5th, stating that their investigation has concluded and the results.

23andMe stated that:

  • They have concluded their investigation and will be notifying affected customers as required by law.

This is a bit confusing because they already HAD notified many people of the original compromise event, that their data had been affected, and forced a password reset. I’m unclear whether this means an additional notification will be sent, or that the earlier notification is what they were referencing.

I’m also curious about the “as required by law” comment, as laws vary widely between countries and even states sometimes. Are they only notifying people to the extent required by law where the customer lives? This would seem both impractical and confusing when some people receive breach notices, and others do not when both are equally affected. Or is 23andMe trying to say they are complying with applicable laws?

  • They verified that the compromise was via credential stuffing, where names (email addresses, in this case) and passwords exposed in previously compromised websites were used to sign into 23andMe accounts.
  • In addition to the entire account information of those 14,000 compromised individuals, all of their DNA Relatives (matches) and information about those relatives were exposed and scraped. In other words, all of your matches and everything you could see about them.

This is also confusing because, in additional details, 23andMe states that the hacker (threat actor) “used the compromised credential stuffed accounts to access the information included in approximately 5.5 million DNA Relatives profiles and 1.4 million Family Tree features profiled, each of which were connected to the compromised accounts.”

The math doesn’t add up. Every test (account) has one AI-generated family tree. If 1.4 million family trees were exposed, and each fully compromised account has one family tree, doesn’t that mean that (minimally) 1.4 million accounts were exposed, not 14,000? That’s 100 times more than 14,000 accounts. Is the decimal in the wrong place?

Is 23andMe perhaps counting the number of people in those trees? I find it difficult to believe that everyone’s trees have 100 people. Mine only has 15 people, and all of them are my highest matches on my DNA Relatives match list, so they are already included in that breach number of 5.5 million. Assuredly, 23andMe is not double counting exposed individuals, so they would not be counted in both places.

Adding together 1.4 million family trees and 5.5 million exposed DNA Relatives, a total of 6.9 million customers have had data exposed in this breach. Apparently,1.4 million people were directly exposed, or their trees could not have been exposed because no one can see your 23andMe-provided tree other than you, and 5.5 million exposures via DNA Relatives matching. Exposed information would have also included your matches matching each other, even if their accounts were not directly compromised.

6.9 million is approximately half of the 23andMe 14 million total customers.

What 23anMe doesn’t say is how many customers, of the 14 million total, actually participate in DNA Relatives. Many of their customers only test for health and traits information, and do not opt-in to DNA matching. Those customers would NOT have trees generated, so would NOT be included in that 1.4 million trees generated, nor the 5.5 million exposed DNA Relatives. Those customers would be in addition to those numbers.

To be clear, you can’t assume that you’re in the clear just because you’re not using the genealogy aspect of 23andMe. Of course, it’s very unlikely that any customers not involved with genealogy will ever see this article.

Protections

23andMe has implemented additional industry-standard security protections for customers to prevent a recurrence.

  • Forced password reset.
  • Added two-factor authentication (2FA) that they are calling both 2SV, two-step verification, and MSV, multiple-step verification, which you can read about in their blog post, here.
  • Provided a Privacy and Security Help Center, here.

Why This Matters

I realize that many people are very unhappy about 2FA, MFA, or 2SV, which are different names for the same thing. However, given the magnitude of this exposure, it’s the responsible step for 23andMe to take.

Those techniques are based on something you know plus something you have or have access to. The something you know is your sign-in and password, and the something you have access to is your phone or email to retrieve a code. A bad actor, unless they stole your phone or have also compromised your email account, won’t be able to obtain the six-digit 2FA number mailed or texted to you.

I know this is somewhat inconvenient, but I’d like to explain why this level of security matters.

Let me give you a brief example. Let’s say that I’m a Jewish person, and the threat actor is interested in harming Jewish people. Based on my ethnicity, I can be clearly identified as Jewish. Therefore, my children and closest relatives can also be identified as Jewish. The tree generated by 23andMe tells the hacker how people fit together, and my closest relatives are clearly identified.

Their names are exposed along with, potentially, their locations, photo, birth year, and other clearly personally identifying information.

Don’t want to think about this in terms of Jewish people? Think about it in terms of any “us versus them” discriminatory situation or even in terms of a domestic violence perpetrator or a stalker gaining access to your children’s information.

Now think about identity theft, which seems benign in comparison to your safety and being targeted, but identity theft is still a very real threat and can wreck your life.

The bad actor (and anyone who buys the compromised data – your information) has enough information to do serious harm, one way or another, depending on their motives, to every person whose information they obtain.

That information may be for sale on the dark web or in some data dump somewhere. We don’t know and will never know who has it and their motivation for obtaining it.

Even if you don’t personally care what is exposed about you – due to trees and matches and information that is typically NOT exposed publicly – you’re connected via matching to OTHER PEOPLE whose data has been exposed because they match you – and your data was breached. Like it or not, we’re all in this together.

Genetic genealogy is a team sport. That’s why we love it. That’s why the hacker loves it, too. So do the hacker’s “customers.”

Most websites have moved or will be moving to 2FA shortly. All “social sites” where people interact with each other one way or another are major targets and are moving in the 2FA direction, too. Just this past week, a dear friend’s entire Facebook account was hacked and subsequently permanently disabled, meaning it’s gone, forever, all within 15 minutes. He lost 11 or 12 years of his life, journaled, along with MANY family and other photos that are no longer on his phone or anyplace else.

All of this pales in comparison to what would happen to your bank account, retirement account, or other financial vehicles. If someone reuses passwords in multiple locations, they are likely to continue the behavior across several accounts because they want to be able to remember the password. This increases the chances DRAMATICALLY of becoming a victim.

2FA is a new way of life that protects us all, and yes, it’s inconvenient, but then again, so are seat belts, and everyone wears those.

Don’t blame the companies who are trying to keep us safe, often in spite of ourselves. Companies certainly don’t relish the idea of angering or inconveniencing their customers, which is probably why they didn’t do it sooner. Blame the bad actors who necessitate this step.

Terms of Service Change

While 23andMe didn’t directly notify customers about the results of their investigation, that it is over, or the people whose accounts were directly compromised – they have sent emails about a change in their terms of service (TOS).

23andMe has upgraded their TOS (terms of service), here, to include mandatory arbitration of disputes, which precludes jury trials or class action lawsuits. In all caps, no less.

And yes, if you’re wondering, class action lawsuits have now been filed in both the US and Canada.

I’m not a lawyer, but based on the language, the new TOS appear to affect all 23andMe customers going forward UNLESS YOU NOTIFY 23andME OTHERWISE.

I received this email on December 5th for one of the tests I manage, and it states that the updated TOS go into effect in 30 days UNLESS YOU NOTIFY 23andME, in which case you will be held to the earlier terms.

Here’s the applicable section, as provided by 23andMe in the Dispute Resolution portion of their TOS, here.

If you do NOT agree, click the “notify us” link in the email, which opens a new email to legal@23andme.com to notify 23andMe.

Remaining Unanswered Questions

23andMe stated that they learned about this breach in early October, but as reported in my earlier articles, some of their customers’ data was reportedly available for sale as early as August 2023. 23andMe does not mention this, so we don’t know if that is a different breach, or if those numbers are included in the 6.9 million 23andMe customers whose accounts have been compromised.

I’d like to know if my account was actually compromised, meaning signed in to, or was my account compromised solely through DNA Relatives matching? It makes a difference in terms of how much of my and my family’s information is exposed.

I assumed that 23andMe would provide people with additional information, but to the best of my knowledge, they have not. Has anyone received an email telling you that your account was personally compromised, meaning signed in to? My notification from 23andMe and the others I’ve seen all say the same as mine, sent in late October, below.

After further review, we have identified your DNA Relatives profile as one that was impacted in this incident. Specifically, there was unauthorized access to one or more 23andMe accounts that were connected to you through DNA Relatives. As a result, the DNA Relatives profile information you provided in this feature was exposed to the threat actor.

Based on our investigation so far, we believe only your DNA Relatives profile attributes were exposed.

Did anyone receive an email that says their account was one of those directly compromised, meaning NOT through DNA Relatives?

Return of Features

Many people have been asking about the return of features that were “temporarily” disabled.

  • Relatives in Common – shared matching, meaning three-way matching
  • Your matches matching with each other, or not
  • Triangulation through Relatives in Common – meaning shared common segments
  • Matches Download File, both including and excluding segments
  • Chromosome browser

Sadly, 23andMe has provided no update on this topic.

Unfortunately, these features include nearly all of the tools that genealogists use, except for individual matching, the 23andMe-created genetic tree, and haplogroups.

We’ve lost the ability to determine how our matches match us through shared matching or triangulation. We now have no way to determine which side, maternal or paternal, a match is on because we can’t tell who else they match or “how” we match them.

I know that genealogy hasn’t been a priority for 23andMe for some time. Medical research is their focus. On October 30th, 2023, 23andMe signed another $20 million one-year deal, plus potential future drug royalties, with GSK for access to the 23andMe database of customers who have consented to medical research.

Genealogists have been an important source of testers in the past because many opted-in for medical and drug research. However, unless 23andMe returns the genealogy functionality, they’ve removed nearly all incentives for genealogists to test there.

If genealogists can’t do genealogy, why would genealogists purchase or recommend their test?

I’m glad I did not repurchase the updated DNA test that would allow me to subscribe to a premium membership to receive 5000 matches instead of 1500 matches. Initially, that membership required purchasing a new test, plus $29 per year, but the membership has now been raised to $69 per year. In August 2023, when their original agreement with GSK expired, 23andMe raised their test prices and laid employees off. I wrote about the August changes here.

Of course, that was about the same time as the original August data exposure, which was followed by the October data exposure, assuming those are two discrete events. 23andMe was clearly experiencing significant financial difficulties, and the 1-2 million spent on the data exposure investigation would have added to those woes.

Regardless, without tools, matches simply aren’t useful. There has been no mention of refunds to people who have subscribed and cannot effectively use the higher level of matches they are receiving. Those of us who haven’t subscribed can’t use ours either.

At this point, 23andMe would be my last testing choice of the four major vendors. I probably wouldn’t recommend them unless someone is searching for an immediate family match, such as an unknown parent or close relatives, and has been unsuccessful elsewhere. Without genealogy tools, unless 23andMe can place a match in the genetic tree they provide, or the match is either very close or previously known, there’s no way to determine how you are related.

Clearly, the investigation and security measures had to be their #1 priority, and patience was in order. But now that the investigation is complete, I hope 23andMe gets this straightened out, returns functionality, and provides additional information to their customers soon

______________________________________________________________

Sign Up Now – It’s Free!

If you appreciate this article, subscribe to DNAeXplain for free, to automatically receive new articles by email each week.

Here’s the link. Just look for the black “follow” button on the right-hand side on your computer screen below the black title bar, enter your e-mail address, and you’re good to go!

In case you were wondering, I never have nor ever will share or use your e-mail outside of the intended purpose.

_____________________________________________________________

Follow DNAexplain on Facebook, here.

Share the Love!

You’re always welcome to forward articles or links to friends and share on social media.

If you haven’t already subscribed (it’s free,) you can receive an email whenever I publish by clicking the “follow” button on the main blog page, here.

You Can Help Keep This Blog Free

I receive a small contribution when you click on some of the links to vendors in my articles. This does NOT increase the price you pay but helps me to keep the lights on and this informational blog free for everyone. Please click on the links in the articles or to the vendors below if you are purchasing products or DNA testing.

Thank you so much.

DNA Purchases and Free Uploads

Genealogy Products and Services

My Book

Genealogy Books

Genealogy Research

27 thoughts on “23andMe Concludes Their Investigation – 6.9 Million Customers’ Data Exposed

  1. I think there could be overlap between 1.4 million family trees and 5.5 million exposed DNA Relatives. So I doubt adding them together is accurate for the number of profiles.

  2. Thanks for the link to “Addressing Data Security Concerns” at the 23 Blog.
    Their own link from that titled item on their blog home page no longer connects to the article itself.

  3. Hi Roberta,

    As far as I can tell, I never received the email you refer to in your post in late October stating “After further review . . . “. I did receive one on Oct. 10 but it was much more general in nature and didn’t specifically say my data was compromised. Could it be that the late October email you got, was 23 and me telling you that your data was accessed?

    23 And Me has always been of limited use because of the lack of trees. Now that nearly all of the tools are gone, it’s just a matter of time before I stop using it entirely.

    Thanks for all of your work publishing this blog,
    John

    • Actually, 23andMe did have a tree feature almost 10 years ago. I tested there before 2013. I saved a screenshot of a tree I posted, dated two years later.
      I’m not sure when they removed the ability to have a tree there. But it has been long enough that most people think 23andMe has never offered a family tree feature similar to the other services (vs. the type that they offered recently, only viewable by the account owner).

      • They did, long ago. They collaborated with MyHeritage for a tree for awhile. But that has been gone for years.

  4. Roberta, Good stuff! I agree the onus is on us to not be lax in our own attention to security details.
    One slight issue I would address, is the friend whose Facebook account was hacked and data irretrievable. I’d expect that if they wanted to, Meta / Facebook could restore all, but possibly the most recent 24 hours data, of a member’s history. A reading of Section 3 of their Terms of Service, reveal that it could take them up to 90 days to delete all of a users data, pictures, comments, etc when the customer deletes the account and asks them to delete all data. And, it even hints that they might never delete some things if they’ve decided it’s something they want to use. You have given the carte blanche permission by agreeing to the TOS and using their system.

    Just words to think on.

    Thanks and best regards,
    Doug C

  5. I first uploaded my DNA Raw Data from another vendor to 23andMe when they allowed that a few years ago. I was astonished when 23andMe reported Indigenous American when other vendors did not report that. 23andme reported 0.1% East Asian & Indigenous American and 0.1% Native American. A few years later I purchased a 23andMe DNA kit as the free upload did for allow you to see matches. 23andMe reports in my new DNA results of 0.2% Indigenous American.
    After this data breach I was thinking of deleting my account. But, with 23andMe being the only DNA service reporting Indigenous American and Native American, I am hesitant to do so, as this seems to verify my family oral history Native American ancestry.

    • I also uploaded my raw data from another vendor during that short window when it was allowed, all with the misunderstanding that I’d be able to see matches (or at least that they’d be able to see me). The first I heard of this breach was on this blog and I went and changed my password. No problem. Then this last week I went to log in again because I’ve decided to close account and delete DNA, and I’m locked out – they apparently changed my password because the one that worked in Oct. no longer works. And now in order for them to let me back in they want me to trust them with a photo ID like passport or DL even though they claim they are still in the middle of the breach investigation (unlike what you say here, it apparently isn’t over or wasn’t a couple of days ago). Stupid me trusting them with the upload in the first place. Any idea if those uploads are in any way affected by this breach?

      • I don’t know but I would assume so, but if you never had matching, you can’t be exposed through DNA Relatives. Only by directly signing since the source of the original breach was reported as credential stuffing. Interesting that they told you the investigation is ongoing.

        • Yes, here is a portion of the email I got on 12/6:
          “In connection with an ongoing security investigation and out of additional caution, we are requiring identity verification in order to unlock your account. You can read more about this investigation on our blog here. Because this is still an ongoing investigation, we unfortunately don’t have additional details to share at this time. Once our investigation is complete, we will contact any customers directly impacted with more information.” They have still not let me back in – they just keep sending emails telling me to reply which I already did along with redacted ID!

  6. Thanks for the update. 23andMe is protecting themselves and not the customers. I’m a retired IT person and your remarks on the use of Multi Factor are spot on. I know people are complaining but it’s a fact of life now.

    • I have not problem with the Multi factor verification, when it works! Ancestry’s doesn’t work for me. It works once and then I never get a code again. I sent an email to them and called them about it; haven’t heard back yet.

  7. I, too, would like to know if my 23andMe account was actually compromised — or those of my close family members who also have accounts. Like you, I only got the boilerplate email you mention above. In fact, I probably would have known nothing about it all had I not been following your blog.

    Re: the 2FA issue. I just signed on to Ancestry and am being prompted to do the 2FA thing. I could be a total ignoramus, but I’m baffled as to why one of my options is to sign in to Ancestry via Google or Apple if I don’t want to do a text or email. It doesn’t seem to me that Google or Apple are immune from data breaches; just wondering how that could be considered “safer”

    • The assumption is that only you have access to those accounts and have to sign in there first. I never do that because the platforms then share some information.

    • I enabled the Ancestry 2FA and it doesn’t work after my first log in. I called them about it and they suggested disabling it and enable again. If that doesn’t work contact their Customer Solutions. I sent them an email and haven’t heard back yet.

  8. Just today I received an email warning from University of Washington Medicine that their partner, the Fred Hutchinson Cancer Ceneter, one of the most prestigious in the country experienced a “cybersecurity incident” that resulted in patients receiving emails from cyber-criminals demanding ransom. The UW email asks that if anyone receives such a ransom demand to contact the FBI. Fortunately, I have not yet received such an email. 23and Me may yet regret its journey into medical research using genealogy customers as guinea pigs. At the very least, I’d suggest people opt out of their medical research.

  9. Does anyone know if attempting to download matches from 23andMe has changed at all since the security breach? I haven’t tried, and – of course – could, but am curious as to anyone’s recent experience.

      • Thanks for the reply Roberta. In reviewing this article I now see that you included “Matches Download File, both including and excluding segments” as part of the features that are effectively suspended with no indication of return of service. I had bought several 23andMe and Ancestry kits on sale and have presented them to close relatives of mine over time with the understanding that I would have full access along side them. This has worked out pretty well not only for the purposes of genetic genealogy, but for a general interest I have in comparing the population genetics and admixture variances of the samples and their matches. These close relatives origins are not only in the countries from which my parents were born – Cuba and Nicaragua – but the origin countries of their other parent (Mexico, Colombia, Peru, Chile). For the 23andMe kits I purchased the 23andMe+ (also on sale) to have access to the advanced features which I do like.

        The latest of these kits that processed yesterday doesn’t include the 23andMe+ feature despite the fact that I initially purchased it. Even when I contact 23andMe and get it straightened out in the next few days, I suspect they won’t have a good answer to the question of what they intend to do for the effective reduced value of a product previously purchased (the kits along with the 23andMe+ feature were purchased well before the security breach).

  10. Your summary prompted me to reassess where I stood on this. I had contacted them about WHEN my genealogy benefits would resume. I did not get a real answer.

    I do have the 5000 matches and I did the medical testing. I have medical reports and have participated in answering many health questions.

    I went in yesterday and stopped everything, sharing, participating in medical research, everything I could stop I stopped. And I canceled my subscription. (although it does run until July).

    Maybe if genealogy subscribers similarly act, they will get the point, that the genealogy subscibers are serious. That’s the reason I tested and subscribe.

  11. Both my husband and I have accounts at 23AndMe. He received an email informing him about the new terms of service, but I did not. When I tried to log into my account to make sure that I opted out of the new terms, I was informed that I needed to change my password (which I had already done after the breach). I have been waiting over an hour for the email link to change my password to be delivered. Definitely different approaches for how they treat my husband’s account and my account. I definitely have a suspicion as to what account may have been breached. FWIW, I don’t think I ever joined DNA Relatives.

  12. Roberta,
    Thank you so much for keeping us updated. 23andMe’s response to this is shocking. I don’t think updating a blog is the way a reputable company should be communicating with their customers.
    The email I received on 12 Oct started with, “We want to provide you with an update and recommended actions.” An update to what? I can’t find anything from them before this email.
    When I went on to remove my “connections” I was kicked out and lock out of my account. When I called and spoke to someone, they had no idea what the error message meant and I had to explain to them several times what had happened. I was finally able to get back in after a couple of days.
    I also contacted them about some questionable activity on my event history log, I was passed over to there “experts”, sent in screen shots. I looked up the IP addresses of the log in attempts and they are not from my IP address, but I don’t know the accuracy of the look up service I was using. 23andMe’s explanation didn’t seem to take into account the IP address not being mine nor did it take into account the location of those IP addresses being in locations that I have never been to. I seriously doubt they bothered to look at the location of the IP addresses.
    I purchased the premium membership in order to get mtDNA Haplogroup matches. I guess I need to contact them to see how I will be compensated for not being able to use the features. That applies to the normal features that you mention in this blog post. At this point is seems that 23andMe is somewhat useless.

  13. Oddly; the Canadian term of service appear not to have changed since 8 June 2022 and I’ve received no mail regarding an update. The current term specify binding arbitration unless prohibited by provincial laws.

  14. Pingback: FamilyTreeDNA 2023 Update – Past, Present and Future | DNAeXplained – Genetic Genealogy

Leave a Reply