this post was submitted on 26 Jan 2024
321 points (98.5% liked)
Technology
58303 readers
12 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Fascinating. I was under the impression that you couldn't get that without having it sent to your email address. I certainly haven't seen any other ways of getting raw genomics out.
Is this that the threat actor sent it to an email that was potentially compromised or do they have download logs of some form of hidden direct download feature?
If they had access to their internal network, they could've exfiltrated it by a ton of different ways.
They wouldn't need to access 14,000 separate accounts if they had internal access to the database.
The article states they got access to "private data" from 6.9 million other users via a 'DNA relatives' feature but doesn't explain what kind of information that is. For those accounts that got directly accessed, it seems unlikely the hackers requested and intercepted an email for every one without being noticed sooner. Sounds like they only scraped what's available on the site itself but it'd be nice if the article actually detailed that.
Ah ok, didn't know we knew those details. I guess they found an API endpoint that allowed them to do this that isn't exposed through the website.
The official RCA is credential stuffing.
Reused passwords are a bitch.
The main surprise is that you were able to get to genomic data with just a password. I thought it was only ever sent over email to the account email.
Maybe the attack involved changing email as well?