Genetics startup Veritas rocked by data breach

Customer information has been stolen from the DNA-screening company

DNA-screening company Veritas Genetics has suffered a security incident in which a hacker accessed and potentially stole customer information.

The company declined to specify what sort of information was compromised as a result of the data breach, although did clarify that no genetic data, DNA-test results or health records were accessed.

Although there are a host of DNA-screening services, companies such as Veritas and 23andMe set themselves apart by claiming to offer customers a full analysis of the human genome. This amounts to examining all 6.4 billion letters, as opposed to just a fraction of the genetic information, as is conventional practice.

"The security and privacy of customer information is a top priority, and we have security processes and procedures in place as part of this commitment, including segregating and securing genomic data on separate systems," the company said in a statement.

Advertisement
Advertisement - Article continues below

"Our forensic investigation is ongoing, and we will notify any potentially impacted individual as appropriate under applicable law."

The startup's customer-facing portal had recently been accessed by an unauthorised user, the company confirmed, although it didn't specify when it became aware of the incident, or how long the system had been exposed.

The firm added that its security processes were robust, and these included segregating and securing genomic data on a separate system to customer information.

"Based on our investigation to date, only a handful of customers were potentially impacted, no genome sequences or genomic data or Veritas test results in any format were accessed and no customer information has been used inappropriately," Veritas continued.

"It is important to note that Veritas Genetics does not store credit card information in its systems.

"Our forensic investigation is ongoing, and we will notify any potentially impacted individual as appropriate under applicable law. We are also considering legal action against the perpetrator and will explore all available legal recourse based on the findings of our investigation."

As services like Veritas Genetics' genomic analysis become more widely-used, there are mounting privacy and security concerns around how tightly-guarded this information is.

Accessing such information could, for example, inform cyber criminals about any medical conditions or genetic issues individuals may have. This could, in some instances, lead to subsequent blackmail attempts.

Similarly, support for biometric security is gaining velocity as an alternative to conventional password security. Experts in the field are concerned, however, with the sense of permanence that is associated with hackers stealing this data.

There are manual ways of replicating a fingerprint, according to German hacking group Computer Chaos Club, although this is laborious and time-consuming. When Apple's Touch ID has first launched six years ago, the outfit demonstrated that one can copy a fingerprint from an existing surface, clean it up using graphite powder, take a high-rest photo and print it off at a high resolution on latex material.

Advertisement
Advertisement - Article continues below

It's nothing compared with a security incident earlier this year, in which the pre-stored biometric information of more than one million people was leaked. Fingerprints and facial recognition information, as well as unencrypted passwords, were exposed when the Biostar 2 database was accidentally made unprotected.

IT Pro has approached Veritas Genetics for more information surrounding the data breach.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019