23andMe Breach: 7M Users' DNA Data Leaked
Learn how 7 million 23andMe users were affected by a major DNA data breach. Discover what happened and steps to protect your genetic information now.
The biggest lie about the 23andMe breach? That it was a "hack." It wasn't. The company didn't get breached in the traditional sense. User credentials were compromised through credential stuffing—attackers used passwords stolen from other breaches to access accounts. Then they exploited 23andMe's DNA Relatives feature to scrape data on millions of people who never had their passwords stolen at all.
This distinction matters because it reveals something worse: your genetic data can be exposed even if you do everything right. If your cousin used "Password123" on another site, their carelessness could leak your DNA profile.
The 23andMe Breach: What Actually Happened
October 2023. Hackers accessed 14,000 accounts using stolen credentials. Seems small, right? Wrong.
Through 23andMe's DNA Relatives feature—which shows genetic matches and their profile information—those 14,000 accounts became a gateway to 6.9 million user profiles. The attackers scraped data on anyone connected through shared DNA markers.
The stolen data appeared on dark web forums. Sellers advertised it by ethnicity: "1 million Ashkenazi Jews," "100,000 Chinese users." The targeting was explicit and disturbing.
23andMe disclosed the 23andMe data leak in stages. First announcement: October 2023. Full scope: December 2023. The company waited months to reveal the real numbers. By then, the genetic data breach had already circulated through underground markets.
Myth: "Only 14,000 People Were Actually Affected"
Reality: 6.9 million users had their data exposed. Another 1.4 million people who opted into DNA Relatives had their family tree information leaked.
The credential stuffing attack on 14,000 accounts was just the entry point. The real damage came from 23andMe's feature design. When you opt into DNA Relatives, you're not just sharing your data with your matches—you're creating a network where one compromised account can expose hundreds or thousands of connected profiles.
Here's what got scraped from those 6.9 million profiles:
- Display names
- Birth years
- Genetic ancestry percentages
- Self-reported locations
- DNA Relatives profile information
- Ancestor birth locations
- Family surnames
- Profile photos (if uploaded)
- Predicted relationships to other users
For the 1.4 million DNA Relatives participants, attackers also grabbed:
- Family tree details
- Relationship labels
- Shared DNA segment data
Myth: "It's Just Ancestry Percentages—Not My Actual DNA Sequence"
Reality: The exposed data reveals enough to identify you, target you, and potentially discriminate against you.
Your ancestry breakdown isn't harmless trivia. It's a biological identifier that can't be changed. Unlike a credit card number or Social Security number, you can't get a new genetic profile.
The DNA data stolen includes information that can be used for:
Insurance discrimination: While the Genetic Information Nondiscrimination Act (GINA) prohibits health insurers from using genetic data, it doesn't cover life insurance, disability insurance, or long-term care insurance. Leaked genetic markers linked to health conditions could affect your ability to get coverage.
Targeted harassment: The data was explicitly marketed by ethnicity on dark web forums. This enables hate groups to identify and target individuals based on genetic ancestry.
Family identification: Even if you never used 23andMe, your relatives' data can expose you. Shared DNA segments and family trees can identify you through genetic triangulation—the same method police use to catch criminals through genealogy databases.
Re-identification attacks: Combine leaked genetic data with other breached information (addresses, phone numbers, email addresses from other leaks) and you create a persistent identifier. Our analysis of data broker aggregation patterns shows that genetic information, when combined with traditional identifiers, makes removal significantly harder because it adds a permanent verification layer.
Myth: "23andMe Will Notify Me If My Data Was Included"
Reality: 23andMe sent notifications, but only to affected users with valid email addresses on file. If you used an old email or your notification went to spam, you might never know.
The company's notification process was slow and incomplete. Initial disclosures in October 2023 vastly understated the scope. The full 6.9 million figure didn't emerge until December 2023—after the data had already circulated for months.
How to Check If Your Data Was Exposed
Log into your 23andMe account directly (don't click email links—phishing attempts spiked after the breach). Go to Settings > Privacy & Sharing. Check if you had DNA Relatives enabled between April 2023 and September 2023.
If you had DNA Relatives turned on during that window, assume your data was included in the 23andMe data leak. The company hasn't provided a precise verification tool for individual users.
Look for notification emails from 23andMe sent between October and December 2023. Search your inbox and spam folders for "23andMe" and "security incident." The subject lines included "23andMe User Data Incident" and "Important Security Notice."
If you find nothing but had DNA Relatives enabled, you're still at risk. The absence of notification doesn't mean safety—it might mean outdated contact information or email delivery failure.
What You Should Do Right Now
The credential stuffing nature of this breach means your 23andMe password was likely reused somewhere else. That "somewhere else" already got breached—that's where attackers found it.
Step 1: Change Your 23andMe Password Immediately
Create a unique password you've never used anywhere else. Not a variation of an old password. Completely different.
Use a password manager to generate something like: `mK9$pL2@vN7&qR4`. Write down your master password on paper. Keep it in your wallet. Don't store it digitally until you've secured your password manager with two-factor authentication.
Step 2: Enable Two-Factor Authentication
Go to Settings > Security in your 23andMe account. Enable two-factor authentication using an authenticator app (Google Authenticator, Authy, 1Password), not SMS. Phone number-based codes can be intercepted through SIM swapping.
Step 3: Review Your Password Reuse
This is the hard part. That password you used on 23andMe—where else did you use it?
Check haveibeenpwned.com for your email address. It'll show which breaches exposed your credentials. If you reused passwords across those sites, attackers already have working username/password combinations for your accounts.
Change passwords on every site where you reused credentials. Yes, every single one. Based on our analysis of credential stuffing patterns, the average person reuses passwords across 7-12 sites. Each one is a potential entry point.
Step 4: Monitor for Identity Theft
Genetic data doesn't trigger traditional identity theft monitoring. Your credit report won't show someone using your ancestry percentages. But the associated personal information—names, locations, birth years—can enable account takeovers and synthetic identity fraud.
Place a credit freeze with all three bureaus:
- Equifax: equifax.com/personal/credit-report-services/credit-freeze (800-349-9960)
- Experian: experian.com/freeze/center.html (888-397-3742)
- TransUnion: transunion.com/credit-freeze (888-909-8872)
A freeze is free. It stops new credit accounts from being opened in your name. You can temporarily lift it when applying for credit yourself.
Check your credit reports for free at annualcreditreport.com. Look for accounts you didn't open or inquiries you didn't authorize.
How Breached Genetic Data Reaches Data Brokers
Here's what most coverage of the 23andMe breach missed: the stolen data doesn't just sit on dark web forums. It gets aggregated, enriched, and sold—eventually making its way into data broker databases.
Data brokers don't directly buy from hackers (that would be obviously illegal). Instead, breached data gets laundered through several steps:
Step 1: Stolen credentials and associated profile data get sold on dark web marketplaces. Prices for the 23andMe data ranged from $1-$10 per record depending on completeness.
Step 2: Buyers use the data to verify and enrich other datasets. Your genetic ancestry percentage becomes another data point confirming your identity across multiple databases.
Step 3: Aggregators compile data from multiple breaches, creating "super profiles" that combine your email, phone number, addresses, relatives' names, and now genetic information.
Step 4: These enriched profiles get sold to data brokers as "consumer insights" or "identity verification data." The brokers claim they only use "publicly available information" and "legally obtained data"—technically true once the data has been laundered through enough intermediaries.
Our monitoring of 1,500+ data broker sites shows a concerning pattern: profiles updated after major breaches suddenly include new data fields that match breach contents. After the 23andMe breach, we observed several brokers adding "ancestry composition" and "genetic heritage" fields to their databases.
The timeline varies. Some brokers incorporate breached data within weeks. Others take 6-12 months. But eventually, your leaked genetic information becomes part of the permanent data broker ecosystem.
Myth: "Deleting My 23andMe Account Removes the Leaked Data"
Reality: Deleting your account removes data from 23andMe's servers. It does nothing about the copies circulating on dark web forums, in data broker databases, or in attackers' archives.
The 23andMe genetic data breach created permanent copies of your information outside 23andMe's control. Account deletion is still worth doing if you're concerned about future breaches, but it doesn't undo the current exposure.
What you need is data broker removal. The leaked information will be aggregated into broker databases over the coming months and years. Removing it requires identifying which brokers have your data and submitting opt-out requests to each one.
Manual removal is possible but brutal. Each broker has different opt-out processes. Some require email verification. Others need ID uploads. Many ignore first requests entirely. Based on our removal data, manually opting out of 100 brokers takes 40-60 hours of work—and that's just the initial removal. Brokers re-add your information from new sources every few months.
Why One-Time Removal Isn't Enough After a Breach
Here's the frustrating reality: data brokers don't just have one source for your information. They pull from dozens or hundreds of sources continuously.
You might successfully remove your profile from Spokeo in January. By March, Spokeo has re-added you using data purchased from a different aggregator. The cycle never ends.
After a breach, this problem intensifies. Your leaked data becomes a new source that brokers can tap indefinitely. It circulates through data trading networks, getting repackaged and resold under different names.
Our analysis of thousands of removal requests shows that breached data reappears on broker sites at significantly higher rates than non-breached data. For users affected by major breaches, re-exposure rates run 3-4x higher than baseline.
Why? Because breached data is:
- Verified: Brokers know it's accurate because it came directly from a company's database
- Enriched: It includes details not available from public records
- Bundled: It comes packaged with other valuable data points
- Cheap: Once leaked, it gets resold endlessly at minimal cost
One-time removal addresses your current exposure. It does nothing about next month's re-exposure when a broker purchases a "fresh" dataset that includes your breached information.
Effective protection after a breach requires continuous monitoring and automated removal. You need something watching for your data's reappearance and immediately submitting new opt-out requests when it surfaces.
What Actually Works: Automated Removal and Monitoring
Manual data broker removal might have been feasible when 20-30 brokers existed. Today there are over 1,500 known sites selling personal information. New ones launch monthly. Keeping up manually is impossible.
Most "data removal services" are just as limited. They cover 35-200 brokers and call it complete. Based on our comparative analysis, competitors typically handle less than 15% of the broker ecosystem. They remove you from the biggest sites and ignore the hundreds of smaller brokers that still expose your information.
GhostMyData monitors and removes your data from 1,500+ brokers—10x more coverage than typical alternatives. Our system:
- Scans broker sites continuously for your information
- Automatically submits opt-out requests using each site's specific process
- Monitors for re-exposure and immediately resubmits removals
- Tracks new brokers as they emerge and adds them to your removal queue
- Provides a dashboard showing exactly which brokers had your data and current removal status
After a breach like 23andMe's genetic data breach, this coverage matters more. Your leaked data will surface on obscure brokers that manual removal would never find. Automated monitoring catches these appearances and removes them before they cause damage.
Start with a free exposure check to see which brokers currently list your information. The scan reveals your current exposure across major data broker sites—often surprising people who assumed they weren't listed.
For comprehensive protection, automated removal provides ongoing coverage. After initial removal (typically complete within 30-60 days), the monitoring continues indefinitely. When your data reappears—and after a breach, it will—removal requests go out automatically.
The 23andMe breach exposed something you can't change: your genetic information. But you can control how much additional information appears alongside it in data broker databases. Removing your profiles means leaked genetic data becomes harder to connect to your current contact information, address, and relatives' details.
The breach already happened. The data is out there. Your move is limiting how useful that data becomes to anyone who wants to find you, target you, or discriminate against you. That starts with getting your information off the 1,500+ sites currently selling it.
Ready to Remove Your Data?
Stop letting data brokers profit from your personal information. GhostMyData automates the removal process.
Start Your Free ScanGet Privacy Tips in Your Inbox
Weekly tips on protecting your personal data. No spam. Unsubscribe anytime.
Related Articles
Ticketmaster Breach: 560M Records Exposed
Ticketmaster breach exposed 560M records. Learn what happened, who's affected, and how to protect your data. Check your account now.
National Public Data Breach: Protect Yourself Now
Learn how the National Public Data breach exposed millions. Discover essential steps to protect your identity and secure your personal information today.
Data Breach? Your Complete Recovery Checklist
Discover essential steps to recover from a data breach. Get your complete checklist now and protect your data today. Act fast!