The Credential-Reuse Crisis Reveals a Deeper Truth: Detection Cannot Fix Architecture

The 23andMe incident of October 2023 was not, as most analyses suggest, primarily a breach of genetic data — it was a public demonstration that the entire consumer-facing identity and authentication model is architecturally insolvent.

In October 2023, 23andMe disclosed that threat actors had accessed approximately 6.9 million customer accounts using credential-stuffing attacks. The attackers leveraged username and password combinations harvested from third-party breaches, then used those credentials to log into 23andMe accounts directly. No zero-day exploit was required. No sophisticated network intrusion was necessary. The attackers simply downloaded password lists from publicly available breach databases, wrote a script, and automated login attempts against 23andMe's web portal until they succeeded. Of the 6.9 million affected accounts, approximately 5.5 million customers had opted into the platform's DNA Relatives feature, which displays sensitive genealogical connections. The breach occurred over a period of weeks before detection, with attackers able to extract not just genetic profile data but also linked family relationships—information that, once exfiltrated, becomes a permanent asset of the attacker and an irreversible privacy loss to every individual in the family tree.

The incident became a flashpoint for US regulatory attention. The Federal Trade Commission (FTC) initiated enforcement action, ultimately settling with 23andMe in December 2024 for a reported penalty and consent decree requiring substantial security improvements, including mandatory multi-factor authentication (MFA), security logging, and annual third-party security assessments under the Health Breach Notification Rule framework. The California Attorney General simultaneously pursued action under California Consumer Privacy Act (CCPA) and unfair practice statutes. Yet the settlement itself—focused on detection, logging, MFA, and vendor assessment—treated the symptom, not the disease.

This pattern recurs across the industry. The Optus breach (September 2022) exposed 9.8 million Australian customers via an unsecured API endpoint; the post-incident remediation centred on access controls and network segmentation. Medibank (October 2022) suffered a similar attack with 9.7 million records exfiltrated; the response was EDR deployment and SIEM hardening. LastPass (August 2022) disclosed that master passwords had been cracked via vault extraction; the industry response was longer passwords and PBKDF2 iterations. Change Healthcare (February 2024) fell to the BlackCat ransomware group after VPN credential compromise; the remedy was MFA and privileged access management (PAM). Each incident triggers a fresh cycle of control-stacking—EDR, SIEM, network detection and response (NDR), advanced authentication, threat intelligence feeds—yet the fundamental architecture remains: a central repository of user secrets (passwords, API keys, session tokens) that, once compromised, grants wholesale access to user data and functions.

The 23andMe incident is instructive precisely because it bypassed every layer of post-breach detection and response infrastructure. The attacker did not need to evade EDR, exfiltrate logs, disable firewalls, or pivot through a network. The attacker simply authenticated as a legitimate user, using legitimate credentials obtained through no vulnerability in 23andMe's systems—only in the user's own credential hygiene across other platforms. The detection-and-response industry (EDR vendors, SIEM platforms, SOAR orchestrators, threat intelligence feeds) built no mechanism to prevent this attack, because the attack is not a technical breach—it is an authentication attack against an architecture that grants database access directly upon presentation of correct credentials.

The Industry Narrative: Credential Reuse as a User Hygiene Problem

The standard narrative emerging from 23andMe and similar incidents frames credential reuse as a consumer education problem. Users reuse passwords across multiple services. When one service is breached and its password database is leaked onto dark web forums or sold to aggregators, those same credentials become usable against all other services where the user has registered. The attacker's toolkit is elementary: a dictionary of dumped credentials, curl or a scripting framework, and a loop. HaveIBeenPwned (maintained by security researcher Troy Hunt) now tracks over 600 million compromised credentials from publicly documented breaches. Credential-stuffing attacks have become so prevalent that they constitute a distinct MITRE ATT&CK technique (T1110.004: Brute Force — Credential Stuffing), with detection guidance issued by the SANS ISC and NIST SP 800-63B.

The industry response has coalesced around five control layers, each now foundational to security frameworks from NIST CSF to ISO 27001 to DORA (Digital Operational Resilience Act) and NIS2:

Layer One: MFA. Multi-factor authentication, particularly FIDO2-compliant hardware keys and time-based one-time passwords (TOTP), makes credential stuffing substantially harder—but not impossible. MFA can be defeated through SIM-swapping attacks (T1556.003), phishing of second-factor codes, recovery code compromise, or MFA fatigue (the 23andMe attacker could trigger MFA prompts and users would, after repeated notifications, eventually approve them). MFA is a necessary hedge; it is not a prevention mechanism.

Layer Two: Passwordless Authentication. Industry movement toward FIDO2, passkeys (stored in secure enclaves), and biometric verification aims to eliminate password guessing altogether. This reduces surface area for credential-stuffing attacks but does not eliminate them—passkeys can still be phished if the authentication ceremony is not cryptographically binding, and passwordless schemes still rely on a central authentication service (Auth0, Okta, AWS Cognito) that becomes a single point of failure.

Layer Three: Anomaly Detection. SIEM and user behaviour analytics (UBA) platforms attempt to flag logins from unusual geographic locations, unusual times, unusual device fingerprints, or unusual access patterns. 23andMe would have had such capabilities; the attacker's automated logins from datacenter IP ranges, targeting bulk data export, should have triggered alerts. Yet these detections are characteristically noisy (false positives exceed true positives by orders of magnitude), and attack-response dwell time frequently exceeds detection latency—meaning the attacker exfiltrates data before the SOC notifies the user.

Layer Four: Credential Isolation. Password managers (Bitwarden, 1Password, Dashlane) and browser-integrated credential vaults reduce the likelihood of password reuse by generating unique, complex passwords for every service. This is a strong practise; it is not a control that an organisation can enforce on consumer users, and it depends on the user's own discipline to use the tool correctly.

Layer Five: Breach Monitoring. Services like HaveIBeenPwned allow users to subscribe to notifications when their email address appears in a publicly documented breach. Organizations can deploy credential-scanning tools (e.g., GitGuardian, TruffleHog) to detect secrets committed to source control. These are detection mechanisms, not prevention mechanisms—they alert after compromise.

The combination of these layers provides real friction against credential-stuffing campaigns. Yet the 23andMe incident occurred in an environment where (1) MFA was available but not mandatory, and (2) the platform had no cryptographic binding between the user and their authentication session, meaning that even with MFA enabled, if the user approved the second-factor prompt (deliberately or under social engineering), the attacker's session became valid. The attacker simply needed the correct username and password—both obtainable from third-party breaches—and credential reuse did the rest.

The Architectural Failure: Why Detection Cannot Solve This

The 23andMe case exposes a structural inevitability that the detection-and-response industry has obscured: credential-reuse attacks cannot be prevented through detection because they are attacks that do not require unauthorised network access or anomalous system behaviour. The attacker authenticates legitimately. The attacker exercises legitimate user permissions. The exfiltration occurs through the application's own intended data export or API paths. From the perspective of the platform's logs, this is not a breach—it is a user accessing their own data.

This is not a failure of 23andMe's engineering. This is a failure of the authentication model itself. The model assumes that if you can present the correct password (or password + second factor), you are the account owner and therefore you should be granted access to everything the account owner can access. This model was reasonable in 1995 when browsers and web applications were novel and most users were within a single organizational perimeter. It is architecturally insolvent in a world where:

  1. Users have accounts across thousands of services.
  2. Passwords are harvested, aggregated, and probabilistically applied at scale.
  3. The cost of automated attack is negligible (a datacenter and a loop).
  4. The attacker's return (entire account access, data export, family tree connections) justifies even a low success rate.

The detection-and-response industry has responded to this by stacking more detection layers (SIEM, UBA, anomaly detection, behaviour analytics). These layers create an illusion of control by making attack slightly harder. But they do not change the fundamental equation: once the attacker has valid credentials, the attacker has legitimate access. You cannot detect your way out of this. You must architect your way out.

The regulatory response—FTC consent decrees, CCPA enforcement, DORA audit requirements, NIS2 incident notification mandates—has consistently demanded better detection, logging, and breach notification. These controls are necessary for compliance. They do not prevent the attack. They optimize the post-breach response: faster detection, faster notification, stronger forensics, faster recovery. This is a concession that breach is inevitable; the control design accepts breach and optimizes for harm reduction after the fact.

The PULSE Reading: Post-Breach Resistance via Architecture

The PULSE doctrine reframes the problem: credential-reuse attacks are preventable not through detection but through architectural separation of authentication from authorization, and through cryptographic binding of the user to the data they access.

Consider an alternative architecture:

Zero-Knowledge Substrate. The platform does not store any plaintext or hashed user secrets. Instead, the platform issues cryptographic key material only to the user's trusted local environment (e.g., a hardware security key, a TEE—trusted execution environment—on the user's phone, or a secure enclave). Authentication becomes a zero-knowledge proof: the user proves they possess the key material without transmitting it. Even if the attacker obtains a valid session token, that token is cryptographically bound to the specific user's key material and cannot be transferred to another attacker's session. In this model, credential reuse is irrelevant—there is no password to reuse.

Data-Plane Encryption with User-Held Keys. Genetic profile data, family tree relationships, and any sensitive data at rest is encrypted with a key derived from the user's authentication material. The 23andMe servers store encrypted blobs. The decryption key never touches the server. Even if the attacker compromises the database, the attacker obtains only encrypted data—useless without the key, which exists only in the user's trusted local environment.

Adaptive Posture Against Credential-Reuse Patterns. For legitimate users who do not use zero-knowledge authentication, the platform can implement a continuous adversarial posture. Rather than static anomaly detection triggered post-login, the platform can:

Domain-Specific Automation. Rather than relying on general-purpose SIEM rules and Sigma detection, the platform embeds threat modelling into the application layer. Genetic data access patterns are analysed against a domain-specific threat model: a legitimate user accesses their own data occasionally; an attacker accessing the data export function from multiple concurrent sessions is anomalous. The detection logic is not a rule in a SIEM—it is a primitive in the application's access-control layer, checked before every operation.

This is not credential-less authentication. This is architecture that assumes credentials will leak, and designs the system such that leaked credentials grant no useful access. The attacker may obtain valid credentials; the attacker obtains only encrypted data, rate-limited access, and cryptographically bound sessions that cannot be transferred.

Implications for Regulated Domains

For organizations operating under DORA (in-scope financial services, systemically important fintech), NIS2 (critical infrastructure, CNI providers), APRA CPS 234 (Australian financial services), MAS TRM (Monetary Authority of Singapore Technology Risk Management), or NYDFS Part 500 (covered entities in financial services), the 23andMe settlement is instructive because it shows the inadequacy of the current regulatory model.

DORA requires incident notification within 24 hours (for major incidents) and mandates testing of incident response. NIS2 requires reporting within 72 hours. The FTC consent decree on 23andMe requires annual third-party security assessment. None of these requirements prevent credential-reuse attacks. They optimize for post-breach response. For organizations handling critical financial infrastructure, critical patient data, or state infrastructure, this is insufficient.

A regulated entity serious about prevention (rather than compliance theatre) would architect systems such that a credential-stuffing campaign simply cannot exfiltrate data, even if the attack succeeds in gaining authentication. This requires:

  1. Elimination of cleartext password storage (obvious, and now baseline).
  2. Elimination of password-authenticated session access to sensitive data (non-obvious, and contested).
  3. Cryptographic binding of user authentication to user-held key material (challenging to retrofit, but feasible).
  4. Encryption of sensitive data with keys never held by the platform (requires architectural redesign).

These are not compliance checkboxes. These are structural requirements that follow from an honest reading of the threat landscape.

Closing the Loop: Why Legacy Controls Have Reached Their Ceiling

The 23andMe incident occurred in October 2023, after 15 years of EDR deployment, after billions in SIEM investment, after the MITRE ATT&CK framework had codified hundreds of attack techniques, after the entire industry had consolidated around detection and response as the primary control paradigm. The attacker did not use a novel exploit. The attacker did not evade EDR. The attacker did not exfiltrate SIEM logs or disable alerting. The attacker simply automated valid authentication and downloaded data.

This is the architectural ceiling of the detection-and-response model: it cannot prevent attacks that do not require technical breach. It can only detect and respond to them. For consumer platforms handling genetic data, for financial institutions handling credentials and transaction data, for healthcare organisations handling patient records, for infrastructure operators handling control systems, this is not acceptable risk reduction—it is risk acceptance dressed in compliance language.

Organizations that intend to build systems resistant to post-breach compromise—not resistant to breach (which is increasingly impossible), but resistant to impact after breach—must depart from the detection-and-response paradigm and adopt architecture that assumes breach and remains operational. This is the PULSE doctrine. It requires different primitives, different design disciplines, and different engineering trade-offs. It is not cheaper than the status quo. It is harder to build and harder to explain to boards accustomed to talking about EDR and SIEM.

Yet for organizations handling the world's data and currency, the status quo is no longer defensible.

---

If your organisation operates infrastructure or handles data sensitive enough that a credential-stuffing attack would constitute an existential incident, request a technical briefing under executed mutual NDA.

Engagement

Request a briefing under executed Mutual NDA.

PULSE engages only with verified counterparties. Strategic briefing material — reference architecture, regulatory mapping, deployment topology — is released after counter-execution of the NDA scoped to the recipient's evaluation purpose.

Request Briefing →

Related Reading