Company Details
23andme
633
80,552
541714
23andme.com
0
23A_2608832
In-progress

23andMe Company CyberSecurity Posture
23andme.com23andMe is a leading consumer genetics and research company. Founded in 2006, the company’s mission is to help people access, understand, and benefit from the human genome. 23andMe has pioneered direct access to genetic information as the only company with multiple FDA authorizations for genetic health risk reports. The company has created the world’s largest crowdsourced platform for genetic research, with 80 percent of its customers electing to participate. The 23andMe research platform has generated more than 180 publications on the genetic underpinnings of a wide range of diseases, conditions, and traits. More information is available at www.23andMe.com Chapter 11 Notice: The deadline to file a proof of claim is July 14, 2025 at 11:59 pm CT if submitted electronically (or 4:59 pm CT if submitted by hardcopy). For more information on how to file a claim, please visit: https://customercare.23andme.com/hc/en-us/articles/31884991159319-Questions-Related-To-23andMe-s-Bar-Notice
Company Details
23andme
633
80,552
541714
23andme.com
0
23A_2608832
In-progress
Between 0 and 549

23andMe Global Score (TPRM)XXXX

Description: In October 2023, **23andMe** suffered a **massive data breach** exposing the **personal and genetic information** of approximately **6.4 million U.S. customers**. The breach resulted from a **cyberattack** where threat actors accessed highly sensitive data, including **raw genotype data, health reports, and self-reported health conditions**. The company faced a **$50 million class-action settlement**, offering affected users compensation (up to **$10,265 per claimant**) for identity fraud, mental health treatment, and other damages. The breach also triggered **five years of free genetic and privacy monitoring** for victims. The incident severely damaged **customer trust**, led to **legal and financial repercussions**, and highlighted the company’s **failure to secure biometric and health data**, which is among the most sensitive categories of personal information. The breach impacted individuals across the U.S., with additional statutory penalties for residents in **California, Illinois, Oregon, and Alaska** due to stricter state privacy laws.
Description: In 2023, **23andMe** suffered a major data breach exposing highly sensitive genetic and ancestry data of nearly **7 million users**. The compromised information included **chromosomal haplogroups, family tree details, and ancestry profiles**, with ethically charged consequences—such as curated dark web lists targeting individuals of **Jewish and Chinese descent**. Initially, the company **blamed users for weak passwords**, exacerbating public distrust. The fallout led to a **costly class-action lawsuit**, severe reputational damage, and heightened scrutiny over the company’s data stewardship practices. The breach underscored the risks of mishandling **biometric and genetic data**, which, unlike financial records, **cannot be changed if exposed**. The incident also highlighted systemic failures in **incident response, transparency, and ethical data management**, reinforcing the need for stricter protections around **health-related and personally identifiable information (PII)**.
Description: The genetic testing company **23andMe** faced a significant data breach exposing customers' personal and genetic information. The breach led to legal claims from affected users, prompting the company to propose settlements as part of its ongoing **Chapter 11 bankruptcy proceedings**. The exposed data included sensitive customer details, raising concerns over privacy, identity theft, and potential misuse of genetic information. The breach’s financial and reputational fallout contributed to the company’s restructuring efforts, with a judge reviewing settlement approvals to resolve customer claims. The incident underscores the severe consequences of failing to protect highly personal data in the biotech sector, particularly when such information can have long-term implications for individuals' health, insurance, and security.
Description: The California Office of the Attorney General reported a data breach involving 23andMe, Inc. on January 21, 2024. The breach occurred on two dates: April 29, 2023, and September 27, 2023. The breach involved the unauthorized access to personal information of customers, including genetic data and other sensitive information. The incident highlights the vulnerability of genetic testing companies to cyber threats and the potential for significant data leaks.
Description: Fallen DNA testing firm 23andMe won court approval of a bankruptcy plan that includes settlements to provide up to $62 million to resolve thousands of data breach claims. Judge Brian C. Walsh of the US Bankruptcy Court for the Eastern District of Missouri approved the plan in a Wednesday order, overruling most creditor objections and challenges from data breach victims. Many of those former customers’ objections were deemed moot or premature, and several of them didn’t appear at a court hearing on the plan. Objections from the Justice Department’s bankruptcy watchdog and a coalition of state attorneys general were resolved ...
Description: 23andMe, a company offering personal genetic testing services, has faced bankruptcy protection while holding a vast collection of sensitive genetic data. Privacy risks are heightened as this data might fall into new hands during a sale process, raising concerns over data protection and potential misuse. Legal frameworks like California’s right to deletion offer some safeguards, yet a national health privacy law in the US is lacking, leaving many customers vulnerable. Customers are advised to download and then request deletion of their personal genetic data to ensure their privacy.
Description: In October 2023, **23andMe** suffered a **massive data breach** exposing the **personal and genetic data of nearly 7 million users**, including highly sensitive DNA profiles, health records, and personally identifiable information (PII). The breach led to severe consequences for affected individuals, including **identity theft, targeted harassment (especially against LGBTQ+ members like Salman Jaberi), mental health deterioration (e.g., Elvira Olguín’s vascular episode and vision loss due to stress), and financial fraud**. The company filed for bankruptcy in March 2024, facing **over 250,000 claims** (many suspected fraudulent) tied to the incident, with settlements proposed at **$30M–$50M (US) and $3.25M (Canada)**—far below the claimed **$51 trillion** in damages. Victims reported **long-term risks**, such as nation-state exploitation of immutable DNA data, while the company struggled to verify legitimate claims. The breach’s **unique harm**—irreplaceable genetic data—heightened distress, with many users feeling the settlements provided **insufficient relief** for ongoing damages like privacy protection costs, medical expenses, and emotional trauma.
Description: 23andMe, a DNA testing company, filed for Chapter 11 bankruptcy in March 2025 following a **2023 data breach** that exposed the personal and genetic data of **nearly 7 million customers**. The breach triggered **dozens of lawsuits globally**, leading to settlements totaling up to **$62 million** for affected claimants, including a **$9 million arbitration settlement** for 32,000 customers, a **$30–$50 million US class-action fund**, and a **$3.25 million Canadian class fund**. The company’s financial collapse was accelerated by **declining demand** and the breach’s reputational and legal fallout. Over **157,000 fraudulent claims** were later identified and removed. The breach forced asset liquidation, including a **$300 million sale** of core assets to co-founder Anne Wojcicki and a **$10 million sale** of its telehealth subsidiary, Lemonaid. The incident also sparked **privacy concerns from over 30 US states**, leading to disputes over liability protections in bankruptcy proceedings. The company is now winding down operations under court supervision, with ongoing negotiations for cyber-insurance settlements and creditor agreements.
Description: In 2023, **23andMe** suffered a **credential stuffing attack** where cybercriminals exploited recycled login credentials from prior breaches to infiltrate ~14,000 user accounts. Due to the company’s **DNA Relatives** and **Family Tree** features—linking users via genetic data—the breach escalated, exposing **6.9 million profiles** (5.5M DNA Relatives + 1.4M Family Tree records). The attack stemmed from **weak password policies**, lack of **rate-limiting on login APIs**, and **password reuse** by users. Regulatory fallout included a **£2.31 million fine** (2025) from the UK’s **Information Commissioner’s Office (ICO)** for failing to protect personal data. The incident highlighted systemic vulnerabilities in **authentication mechanisms** and **data interconnectivity**, enabling a localized breach to spiral into a **mass genetic data exposure** with long-term privacy and fraud risks for affected individuals.
Description: 23andMe discovered that specific customer profile data that customers had agreed to share through their DNA Relatives function had been gathered from individual accounts without the users' consent. They launched an investigation as soon as they became aware of any suspicious conduct. While they are still looking into this situation, they think that when individuals reused login information, threat actors may have gained access to some accounts. According to the company, the threat actor may then have accessed certain 23andMe.com accounts without authorization in violation of their Terms of Service and obtained information from those accounts, including details about users' DNA Relatives profiles, to the extent a user opted into that service.


23andMe has 347.76% more incidents than the average of same-industry companies with at least one recorded incident.
23andMe has 368.75% more incidents than the average of all companies with at least one recorded incident.
23andMe reported 3 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 3 data breaches, compared to industry peers with at least 1 incident.
23andMe cyber incidents detection timeline including parent company and subsidiaries

23andMe is a leading consumer genetics and research company. Founded in 2006, the company’s mission is to help people access, understand, and benefit from the human genome. 23andMe has pioneered direct access to genetic information as the only company with multiple FDA authorizations for genetic health risk reports. The company has created the world’s largest crowdsourced platform for genetic research, with 80 percent of its customers electing to participate. The 23andMe research platform has generated more than 180 publications on the genetic underpinnings of a wide range of diseases, conditions, and traits. More information is available at www.23andMe.com Chapter 11 Notice: The deadline to file a proof of claim is July 14, 2025 at 11:59 pm CT if submitted electronically (or 4:59 pm CT if submitted by hardcopy). For more information on how to file a claim, please visit: https://customercare.23andme.com/hc/en-us/articles/31884991159319-Questions-Related-To-23andMe-s-Bar-Notice

At Charles River, we are guided by our strong purpose—to create healthier lives—which centers around the patients who rely on the therapeutics we help to develop, the animals in our care, to our planet, and to the passionate and skilled people who are at the heart of our organization and make it all
CSL is a leading global biotechnology company with a dynamic portfolio of lifesaving medicines, including those that treat haemophilia and immune deficiencies, vaccines to prevent influenza, and therapies in iron deficiency, dialysis and nephrology. Since our start in 1916, we have been driven by ou
Agilent customers are finding new ways to treat cancer, ensure food, water, air, and medicine quality and safety, discover new drug treatments, research infectious diseases, and create alternative energy solutions for a greener planet. From start to finish, we have them covered with our vast product
Since 1987, Eurofins has grown from one laboratory in Nantes, France to over 65,000 staff across a network of independent companies in 60 countries, operating over 950 laboratories. Performing over 450 million tests every year, Eurofins offers a portfolio of over 200,000 analytical methods to eva
Since our foundation in Dublin, Ireland in 1990, our mission has been to help our clients to accelerate the development of drugs and devices that save lives and improve quality of life. We do this by delivering best in class information, solutions and performance, with an unyielding focus on quality
About Genentech We're passionate about finding solutions for people facing the world's most difficult-to-treat conditions. That is why we use cutting-edge science to create and deliver innovative medicines around the globe. To us, science is personal. Making a difference in the lives of millions s
Syneos Health® is a leading fully integrated biopharmaceutical solutions organization built to accelerate customer success. We translate unique clinical, medical affairs and commercial insights into outcomes to address modern market realities. We bring together a talented team of professionals w

A family-owned company, bioMérieux has grown to become a world leader in the field of in vitro diagnostics. Our entrepreneurial adventure, begun over a century ago, is driven by an unrelenting commitment to improve public health worldwide. Since 1963, we've been paving the way in the field of in v
About Thermo Fisher Scientific Thermo Fisher Scientific Inc. is the world leader in serving science, with annual revenue of approximately $40 billion. Our Mission is to enable our customers to make the world healthier, cleaner and safer. Whether our customers are accelerating life sciences research,
.png)
A trove of the bankrupt company's DNA profiles on millions of users is up for sale on the darknet.
23andMe has asked a Missouri bankruptcy judge to approve a $3.25 million settlement reached with a class of 300000 Canadian citizens whose...
Today is the deadline for 23andMe customers to submit a claim for compensation, if eligible.
July 14 at 11:59 p.m. CT is your last chance to file a claim with 23andMe for a 2023 data breach that may have compromised your genetic...
A 2023 cyberattack compromised the sensitive personal information of nearly 7 million customers.
If you have a 23andMe account, you have until July 14 to file a claim as part of the restructuring in its bankruptcy case.
23andMe experienced a data breach that exposed over seven million of its customers' genetic information in 2023.
The clock is ticking and you've got less than 2 weeks left to file a claim and get part of the 23andMe class-action settlement.
The medical research nonprofit vying to buy 23andMe is informing existing customers that it plans to complete the deal on July 8.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of 23andMe is https://www.23andme.com.
According to Rankiteo, 23andMe’s AI-generated cybersecurity score is 100, reflecting their Critical security posture.
According to Rankiteo, 23andMe currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, 23andMe is not certified under SOC 2 Type 1.
According to Rankiteo, 23andMe does not hold a SOC 2 Type 2 certification.
According to Rankiteo, 23andMe is not listed as GDPR compliant.
According to Rankiteo, 23andMe does not currently maintain PCI DSS compliance.
According to Rankiteo, 23andMe is not compliant with HIPAA regulations.
According to Rankiteo,23andMe is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
23andMe operates primarily in the Biotechnology Research industry.
23andMe employs approximately 633 people worldwide.
23andMe presently has no subsidiaries across any sectors.
23andMe’s official LinkedIn profile has approximately 80,552 followers.
23andMe is classified under the NAICS code 541714, which corresponds to Research and Development in Biotechnology (except Nanobiotechnology).
Yes, 23andMe has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/23andme.
Yes, 23andMe maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/23andme.
As of November 28, 2025, Rankiteo reports that 23andMe has experienced 10 cybersecurity incidents.
23andMe has an estimated 4,353 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.