this post was submitted on 07 Jan 2024
205 points (96.0% liked)

Technology

58012 readers
2889 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

23andMe Blames Users for Recent Data Breach as It's Hit With Dozens of Lawsuits::Plus: Russia hacks surveillance cameras as new details emerge of its attack on a Ukrainian telecom, a Google contractor pays for videos of kids to train AI, and more.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 42 points 8 months ago* (last edited 8 months ago) (25 children)

They're not wrong, this is because of users re-using passwords and an unrelated hacked database being used to brute-force access to 23andMe by checking to see if users re-used passwords. Shocker, they did.


I'll ask a question: What is a security system supposed to do when provided with the correct login credentials?


Hopefully it will inspire more companies to force 2FA, like 23andMe is doing now. That's honestly the biggest part that is their own fault, not forcing MFA from the get-go on their customer base.

[–] [email protected] 9 points 8 months ago (9 children)

I'm downvoting you even though I believe the users are negligent and partially to blame here. However, does the site not lock log in attempts after the first 10 login attempts or something? At this point, something so sensitive like ancestry and health information should be mfa required at the bare minimum a phone number 2fa would help a bit.

[–] [email protected] 0 points 8 months ago* (last edited 8 months ago) (6 children)

However, does the site not lock log in attempts after the first 10 login attempts or something?

They had accurate credentials. They didn't hit a login wall because people were re-using their passwords. They hit a login-wall for people who didn't re-use their passwords. They got accurate credentials from an unrelated hack, from people re-using passwords. How many times does a system "block" you when you have the right username and password the first time?? Zero, I'm pretty fucksure.

(Also, it's usually more like three attempts.)

I am very confused at what people think computers are supposed to do when given the correct login information? The point of login information is to prove who you are. If you have the correct information, the computer cannot know who is behind the keyboard.

At this point, something so sensitive like ancestry and health information should be mfa required at the bare minimum a phone number 2fa would help a bit.

On this point, I agree. 23andMe seems to now as well, considering they just rolled out required MFA for all their users. However, we live in a world basically zero data privacy laws in the US. The US can't even fucking pass a budget, so good luck waiting on privacy laws. You want that kind of consideration, you gotta move to Europe.

Like 23andMe, companies don't really care until something has already happened, since there isn't legislation forcing them to care.

Finally, phone 2FA is garbage that can be intercepted. It shouldn't be used. The fact that it's still the default means this won't be the end of data breaches. People need to embrace security keys like YubiKey.

[–] [email protected] 9 points 8 months ago (1 children)

I get asked to prove I’m making a legit login attempt all the time because it’s from a new IP address. 23andMe could have implemented something similar, and given the sensitive nature of the data they host and given how we all know that people can’t be trusted to have good password hygiene, I think they should have been required to do so.

IMO this whole thing is just more proof that we need better regulation around how companies treat users’ private information.

[–] [email protected] -4 points 8 months ago* (last edited 8 months ago) (1 children)

I think they should have been required to do so.

Did you miss the part where our government can't even pass a budget, but you're expecting them to pass laws like this?

Also, IP spoofing exists and is relatively easy.

[–] [email protected] 5 points 8 months ago

You can't spoof your IP address because of the TCP handshake. You could proxy your traffic to appear from coming from a different IP address than from the computers making the requests. This would still be identified as suspicious because the proxy IP address would differ from an IP address a user had logged in from before.

Even if the "hackers" knew every user's IP address, they would not be able to establish a connection with it appearing from an IP address that didn't really initiate the traffic.

load more comments (4 replies)
load more comments (6 replies)
load more comments (21 replies)