this post was submitted on 03 Jan 2024
827 points (94.1% liked)

Technology

58012 readers
2931 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Hope this isn't a repeated submission. Funny how they're trying to deflect blame after they tried to change the EULA post breach.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 19 points 8 months ago (2 children)

And I agree with them, I mean 23andMe should have a brute-force resistant login implementation and 2FA, but you know that when you create an account.

If you are reusing creds you should expect to be compromised pretty easily.

[–] [email protected] 31 points 8 months ago (9 children)

A successful breach of a family member's account due to their bad security shouldn't result in the breach of my account. That's the problem.

[–] [email protected] 17 points 8 months ago* (last edited 8 months ago) (1 children)

A successful breach of a family member’s account due to their bad security shouldn’t result in the breach of my account. That’s the problem

I mean...

You volunteered to share your info with that person.

And that person reused a email/password that was compromised.

How can 23andme prevent that?

It sucks, but it's the fault of your relative that you entrusted with access to your information.

No different than if you handed them a hardcopy and they left it on the table of McDonald's .

Quick edit:

It sounds like you think your account would be compromised, that's not what happened. Only info you shared with the compromised relative becomes compromised. They don't magically get your password.

But you still choose to make it accessible to that relatives account by accepting their request to share

[–] [email protected] -2 points 8 months ago (1 children)

Could I please have your personal information?

[–] [email protected] 6 points 8 months ago (1 children)
[–] [email protected] 1 points 8 months ago (2 children)

Ok, who else would be able to give me your personal information. I'll go get it from them instead.

[–] [email protected] 6 points 8 months ago (1 children)

Your mom has my contact information. You can ask her.

/pwn3d.

[–] [email protected] 2 points 8 months ago (1 children)

And that’s exactly how the attackers got in in the first place lol.

The ding dongs used the same creds elsewhere which were leaked.

[–] [email protected] 0 points 8 months ago (1 children)

Thank you for explaining the point I was making to me.

[–] [email protected] 1 points 8 months ago

Ah I misread the thread somehow.

[–] [email protected] 13 points 8 months ago

I doesn't. Sharing that info was opt-in only. In this scenario, no 23andMe accounts were breached. The users reused their credentials from other sites. It would be like you sharing your bank account access with a family member's account and their account getting accessed because their banking password was "Password1" or their PIN was "1234".

[–] [email protected] 13 points 8 months ago

Yep it was 14,000 that were hacked, the other 6.9 million were from that DNA relative functionality they have. Unfortunately 23andMe's response is what to expect since companies will never put their customers safety ahead of their profits.

[–] [email protected] 10 points 8 months ago

So if you enabled a setting that is opt-in only that allows sharing data between accounts and you are surprised that data was shared between accounts how is that not your fault?

[–] [email protected] 9 points 8 months ago (1 children)

afaik there was no breach of private data, only the kind of data shared to find relatives, which is opt-in and obviously not private to anyone who has seen how this service works. In other words, the only data "leaked" was the kind of data that was already shared with other 23andMe users.

[–] [email protected] -2 points 8 months ago (1 children)

Name, sex and ancestry were sold on the dark web, that's a breach of private data.

The feature that lets a hacker see 500 other people's personal information when they hack an account is obviously a massive security risk. Especially if you run a single use service - no one updates their password on a site they don't use anymore.

Launching the feature in the first place made this inevitable.

[–] [email protected] 3 points 8 months ago* (last edited 8 months ago)

Name, sex and ancestry were sold on the dark web, that’s a breach of private data.

It would be a breach if the data was private, but the feature itself exposes this data. That would be like presenting a concert to hundreds of people then complaining your facial attributes were leaked in social media.

[–] [email protected] 8 points 8 months ago (1 children)

You shouldn’t have shared your information with someone who is untrustworthy then. Data sharing is opt-in.

[–] [email protected] -1 points 8 months ago

Credential stuffing attacks will always yield results on a single use website because no one changes passwords on a site they don't use anymore.

Launching a feature that enables an inevitable attack to access 500 other people's info is very clearly the fault of the company who launched the feature.

[–] [email protected] 6 points 8 months ago

How do you and the surprising number of people who upvoted you want options on websites to work?

These people opted into information sharing.

When I set a setting on a website, device, or service I damn sure want the setting to stick. What else would you want? Force users to set the setting every time they log in? Every day?

Wtf?

[–] [email protected] 5 points 8 months ago* (last edited 8 months ago)

Even if you didn’t reuse a compromised password yourself, the fact that your relatives did indicates that you’re genetically predisposed to bad security practices. /s

[–] [email protected] 2 points 8 months ago

A successful breach of a family member’s account due to their bad security shouldn’t result in the breach of my account. That’s the problem.

How the hell would they prevent that if you voluntarily shared a bunch of information with the breach account? This is like being mad that your buddy's Facebook account got breached and someone downloaded shared posts from your profile, too. It's how the fucking service works.

[–] [email protected] -2 points 8 months ago* (last edited 8 months ago) (2 children)

Is it also the User's fault for the 6,898,600 people that didn't reuse a password and were still breached?

[–] [email protected] 8 points 8 months ago (1 children)

Yes, because you have to choose to share that data with other people. 23andMe isn't responsible if grandma uses the same password for every site.

[–] [email protected] -3 points 8 months ago (2 children)

23andMe is responsible for sandboxing that data, however. Which they obviously didn't do.

[–] [email protected] 6 points 8 months ago (1 children)

User opted-in to share those data

[–] [email protected] 0 points 8 months ago (3 children)

You opt in to share your data with Facebook. Would you still consider it an issue if your data was breached because someone else's account was hacked?

[–] [email protected] 4 points 8 months ago

I would consider normal that my photos that I only share with some people were leaked if one of those people's accounts got hacked.

[–] [email protected] 2 points 8 months ago* (last edited 8 months ago)

Sure, it's a breach, but I would blame my idiot friend for re-using passwords. I wouldn't blame the service for doing exactly what I expected the service to do, and is the reason I chose to use the service in the first place.

It's also the reason I've very selective about what I share with anyone online, friend or otherwise.

[–] [email protected] 1 points 8 months ago* (last edited 8 months ago) (1 children)

If you share your nudes with the "friends only" privacy settings on facebook, and someone else accesses one of your friends accounts because they reused their password and proceeds to leak those photos, is it the fault of Facebook, your friend, the person leaking them, or you?

Because that is exactly what happened here. Credit stuffing reused passwords and scraping opt-in "friends only" shared data between accounts.

[–] [email protected] 0 points 8 months ago (1 children)

Private health data was compromised as well, on a smaller scale. It doesn't make sense to blame users for a security breach of a corporation, literally ever. That's my point. The friend was dumb, and you shared something maybe you shouldn't have. But that doesn't also absolve the company of poor security practices. I very strongly doubt that 14,000 people knew or consciously chose to directly share with a collective 7 million people.

[–] [email protected] 3 points 8 months ago* (last edited 8 months ago)

But they did. All 7 million of them - that's why their data was visible for those 14000.

As it says in the article:

From these 14,000 initial victims, however, the hackers were able to then access the personal data of the other 6.9 million victims because they had opted-in to 23andMe’s DNA Relatives feature. This optional feature allows customers to automatically share some of their data with people who are considered their relatives on the platform.

Here's what each and every one of those 7 million people opted in and agreed to:

https://customercare.23andme.com/hc/en-us/articles/115004659068-DNA-Relatives-The-Genetic-Relative-Basics

[–] [email protected] 4 points 8 months ago

Did you not read my comment? Users opt in to sharing data with other accounts, which means if one account is compromised, then every account that allowed them access would have their data compromised too. That's not on the company, because they feature can't work without allowing access.

[–] [email protected] 6 points 8 months ago (1 children)

They weren't breached. The data they willingly shared with the compromised accounts was available to the people that compromised them.