23andMe 'failed to take basic steps' to safeguard customer data
The ICO has strong criticism for the way the genetic testing company responded to a 2023 breach.
The Information Commissioner's Office (ICO) has slapped a fine of £2.31 million on genetic testing company 23andMe for failing to protect customer data after a cyber attack.
The credential stuffing attack, which took place between April and September 2023, saw the exposure of the personal information of 155,592 UK residents.
The data exposed included names, birth years, location, profile images, race, ethnicity, family trees, and health reports.
At the time, the company was roundly criticized for appearing to blame users themselves for the breach. It wrote to customers saying they'd "failed to update their passwords following past security incidents unrelated to 23andMe", and had "negligently recycled" login credentials from other accounts that were already exposed.
The ICO, though, takes a different view.
"This was a profoundly damaging breach that exposed sensitive personal information, family histories, and even health conditions of thousands of people in the UK. As one of those impacted told us: once this information is out there, it cannot be changed or reissued like a password or credit card number," said information commissioner John Edwards.
"23andMe failed to take basic steps to protect this information. Their security systems were inadequate, the warning signs were there, and the company was slow to respond. This left people's most sensitive data vulnerable to exploitation and harm."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Specifically, the ICO found that 23andMe had failed to implement appropriate authentication and verification measures when customers logged in, including mandatory multi-factor authentication (MFA) and strong passwords.
It also failed to put appropriate security measures in place to deal with access to and the downloading of raw genetic data.
Nor did it have the right measures in place to monitor for, detect, and appropriately respond to cyber threats to its customers' personal information.
"Strong data protection must be a priority for organizations, especially those that are holding sensitive personal information," said Philippe Dufresne, privacy commissioner of Canada, who collaborated with the ICO on the investigation.
"With data breaches growing in severity and complexity, and ransomware and malware attacks rising sharply, any organization that is not taking steps to prioritize data protection and address these threats is increasingly vulnerable."
As well as failing to protect customer data, 23andMe handled the attack badly, the authorities concluded. The hackers kicked off their credential stuffing attack in April 2023, ramping up efforts in May and attempting to initiate profile transfers in July. This didn't happen invisibly, with 23andMe's platform stopping working, leaving the company's users unable to access it.
However, said the ICO, "Despite 23andMe investigating this incident at the time, it failed to detect that this was part of a larger ongoing data breach."
It didn't start a full investigation until October 2023, when a 23andMe employee discovered that the stolen data had been advertised for sale on Reddit. Only then did 23andMe confirm that a breach had occurred.
In August, indeed, it even dismissed a claim of data theft affecting over 10 million users as a hoax.
23andMe has since filed for Chapter 11 bankruptcy in the US, with a sale hearing set for today. The ICO said it was monitoring the situation closely, pointing out that the protections and restrictions of the UK GDPR continue to apply.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Manufacturers report millions in losses as downtime wreaks havoc on operationsNews UK manufacturers are losing up to £736 million every week due to downtime, according to new research, with outages lasting for several days on end.
-
Microsoft gives OpenAI restructuring plans the green lightNews The deal removes fundraising constraints and modifies Microsoft's rights to use OpenAI models and products
-
Teens arrested over nursery chain Kido hacknews The ransom attack caused widespread shock when the hackers published children's personal data
-
Red Hat reveals unauthorized access to a GitLab instance where internal data was copiedNews Crimson Collective has claimed the attack, saying it has accessed more than 28,000 Red Hat repositories
-
Google warns executives are being targeted for extortion with leaked Oracle dataNews Extortion emails being sent to executives at large organisations appear to show evidence of a breach involving Oracle's E-Business Suite
-
Harrods rejects contact with hackers, after 430,000 customer records stolen from third-party providerNews The luxury department store has denied any link to a failed attack on its systems in May
-
Kido nursery hackers threaten to release more details – along with the personal data of 100 employeesNews The attack is the first to be claimed by the new threat group 'Radiant'
-
Air France and KLM confirm customer data stolen in third-party breachNews A spokesperson told ITPro the airlines are investigating "fraudulent access" to customer data following a third-party breach.
-
Average Brit hit by five data breaches since 2004News While the number of breaches has fallen, the UK has been the worst-hit country in Northern Europe since 2004
-
Personal data taken in Oxford City Council cyber attacknews The personal data of election workers has been accessed, but the council says it moved quickly to limit the effects of the breach
