The 23andMe Breach: How Not to Handle a Cyber Security Incident

fahd.zafar • June 20, 2025

The genetic testing company 23andMe has been handed a £2.31 million fine by the UK's Information Commissioner's Office (ICO) following a devastating data breach that exposed the personal information of seven million people worldwide. For cybersecurity professionals, this case offers sobering lessons about the catastrophic consequences of inadequate security practices.

The Scale of the Breach

The numbers alone tell a stark story. Over 150,000 British users had their most intimate data stolen, including:

  • Genetic profiles and family trees
  • Health reports and medical predispositions
  • Race and ethnicity information
  • Personal details (addresses, dates of birth, profile pictures)

Perhaps most chilling was the discovery of a database containing nearly one million people allegedly identified as having Ashkenazi Jewish heritage – information that could be weaponised for discrimination or targeted harassment.

A Timeline of Failures

The breach timeline reveals a pattern of security failures that should concern every organisation handling sensitive data:

April 2023: Attack begins
October 2023
: 23andMe finally opens investigation (6 months later)
End of 2023
: Security defences finally strengthened enough to halt the attack

This six-month delay between the attack commencing and the company's response represents a fundamental failure in threat detection and incident response capabilities.


What Went Wrong

The ICO's investigation identified several critical security failures:

Inadequate Security Systems

23andMe's security infrastructure was simply not fit for purpose given the sensitivity of the data they were handling. Basic security controls that should have been in place were absent or ineffective.

Poor Threat Detection

The company had no effective monitoring systems to detect the ongoing attack. It took an employee stumbling across their stolen data being advertised for sale on Reddit to trigger an investigation.

Delayed Response

Even after discovering the breach, 23andMe's response was slow and inadequate. The ICO noted that "warning signs were there" but the company failed to act on them promptly.

Failure to Protect Sensitive Data

Genetic information is amongst the most sensitive personal data possible – it's immutable, hereditary, and reveals intimate details about individuals and their families. 23andMe failed to implement security measures commensurate with this level of sensitivity.


The Business Consequences

The breach's impact extended far beyond regulatory fines:

  • Bankruptcy: By March 2025, 23andMe had filed for bankruptcy
  • Trust collapse: Unable to rebuild customer confidence
  • Fire sale: The company is being sold for just $305m (£225m)
  • Legal challenges: 28 US attorneys general have launched legal action
  • Regulatory scrutiny: Multiple investigations across jurisdictions

This demonstrates how a single cybersecurity failure can destroy a business entirely.

Lessons for Organisations

1. Sensitive Data Requires Exceptional Security

Organisations handling sensitive data must implement security controls that match the risk profile. Genetic data, financial information, and personal health records demand the highest levels of protection.

2. Detection is as Important as Prevention

23andMe's failure to detect the attack for six months highlights the critical importance of robust monitoring and threat detection capabilities. You cannot respond to threats you cannot see.

3. Incident Response Must Be Rapid

In cybersecurity, time is everything. The longer an attack continues undetected, the more damage it causes. Every organisation needs tested incident response procedures and the capability to execute them quickly.

4. Regular Security Assessments are Essential

The ICO noted that "warning signs were there" – suggesting that proper security assessments could have identified vulnerabilities before they were exploited.

5. Data Retention Policies Matter

Questions about whether 23andMe truly deletes user data when requested highlight the importance of clear, implemented data retention and deletion policies.



Regulatory Implications

The £2.31 million fine represents the maximum penalty the ICO can impose, reflecting the severity of the failures. However, as cybersecurity expert James Moss noted, the enforcement order – which dictates how data must be protected going forward – may be more significant than the financial penalty.

This case demonstrates that regulators are taking an increasingly tough stance on organisations that fail to protect sensitive personal data adequately.



Protecting Your Organisation

The 23andMe breach offers clear guidance for organisations seeking to avoid similar failures:

Implement Comprehensive Monitoring: Deploy systems that can detect unusual access patterns and potential breaches in real-time.

Develop Robust Incident Response: Have tested procedures for rapidly responding to security incidents, including clear escalation paths and communication protocols.

Regular Security Assessments: Conduct frequent penetration testing and vulnerability assessments to identify weaknesses before attackers do.

Data Classification and Protection: Ensure security measures are appropriate to the sensitivity of the data you're handling.

Staff Training: Ensure employees can recognise and respond to security threats appropriately.



Moving Forward

The 23andMe case serves as a stark reminder that in today's threat landscape, cybersecurity is not optional – it's existential. Organisations that fail to implement adequate security measures risk not just regulatory fines, but complete business failure.


For businesses handling any form of sensitive data, the message is clear: invest in robust cybersecurity measures now, or risk joining 23andMe in the growing list of companies destroyed by preventable security failures.

The question every business leader should ask is not whether they can afford to invest in proper cybersecurity, but whether they can afford not to.

Contact Altiatech to discuss how we can help protect your organisation from similar threats. Email: innovate@altiatech.com | Phone: +44 (0)330 332 5482

By fahd.zafar June 18, 2025
Discover why sustainable cyber security depends on organisational culture, not just technology. Learn how to build security-minded cultures that empower people and reduce risk
May 7, 2025
The recent cyber attack on Co-op stores serves as a stark reminder of how digital disruptions can quickly cascade into real-world consequences. With stores facing empty shelves, payment system failures, and compromised customer data, this incident highlights the critical importance of robust cybersecurity measures for all businesses, regardless of industry.
By monsur.ali May 6, 2025
The retail sector has recently experienced a wave of significant cyber attacks, bringing cybersecurity back into sharp focus for businesses across the UK. As technology partners dedicated to helping organisations secure their digital future, we at Altiatech want to share some key insights and practical recommendations to help strengthen your security posture. 
By fahd.zafar May 2, 2025
The UK retail sector has been rocked by a series of high-profile cyber attacks this week, with luxury department store Harrods becoming the latest victim. This follows similar incidents at Marks & Spencer and Co-op, raising serious concerns about cybersecurity vulnerabilities across the retail industry. 
April 28, 2025
The Impact of a Major Retail Security Breach The recent cyber incident at Marks & Spencer has sent shockwaves through the British retail sector.
By Sean Bird March 10, 2025
In a significant development for email security protocols in the UK, the National Cyber Security Centre (NCSC) announced forthcoming changes to its Mail Check service.
By fahd.zafar February 12, 2025
With the UK government's announcement of world-first AI cyber security standards, organisations need a clear roadmap for implementation. At Altiatech, we're already helping businesses adapt their security frameworks to meet these new requirements while maintaining operational efficiency.
By fahd.zafar February 5, 2025
With Microsoft's recent announcement of the removal of their VPN feature from Microsoft 365 subscriptions, organisations need to reassess their security strategy. At AltiaCyber, we're helping businesses turn this change into an opportunity to strengthen their overall security posture.
By fahd.zafar January 30, 2025
In a sobering report released by the National Audit Office (NAO), the UK government's cyber security posture has been revealed to have significant vulnerabilities, with the threat landscape advancing at an alarming pace. The findings highlight critical gaps in cyber resilience across multiple government departments, raising serious concerns about the protection of vital public services.
By fahd.zafar December 12, 2024
At Altiatech, we're committed to helping organisations secure their digital future. Our latest security advisory highlights critical patches and updates that require your immediate attention.
More Posts