Genetic Data Platform OpenSNP To Shut Down Over Data Privacy Concerns - 1

Photo by Digital.de on Unsplash

Genetic Data Platform OpenSNP To Shut Down Over Data Privacy Concerns

  • Written by Andrea Miliani Former Tech News Expert
  • Fact-Checked by Sarah Frazier Former Content Manager

The open-source genetic data platform openSNP announced this Monday that it will shut down on April 30 this year due to privacy concerns.

In a rush? Here are the quick facts:

  • openSNP announced this Monday that it will shut down on April 30, 2025.
  • Its co-founder, Bastian Greshake Tzovaras, explained that the decision had to do with data privacy concerns, including 23andMe’s bankruptcy announcement.
  • Greshake Tzovaras also raised alarms over current genetic data use and the rise of authoritarian governments.

openSNP’s co-founder, Bastian Greshake Tzovaras, shared a blog post explaining that the decision has been made after considering data privacy risks, 23andMe’s recent bankruptcy announcement and its massive data breach—exposing private information of over 7 million users—, as well as the rise of authoritarian governments globally.

“The risk/benefit calculus of providing free & open access to individual genetic data in 2025 is very different compared to 14 years ago,” wrote Greshake Tzovaras. “And so, sunsetting openSNP – along with deleting the data stored within it – feels like it is the most responsible act of stewardship for these data today.”

openSNP was founded in 2011 by Greshake Tzovaras, Philipp Bayer, and Helge Rausch as an open and public platform for people to donate genetic and phenotypic data for scientific purposes and to open up access to genetic data to everyone.

Despite the major achievements such as becoming one of the world’s largest resources for genetic data and the scientific breakthroughs like the findings on “genetic origins of Chronic Fatigue Syndrome,” Greshake Tzovaras explains that he believes that circumstances have changed and that his initial beliefs now look “naïve” and too “data-centric” to him.

Greshake Tzovaras points out that multiple companies and organizations wanted to buy openSNP for its data, but that they remained independent until the end, and found financial solutions–including crowdfunding strategies—to help the organizations remain true to their values and protect their users’ data.

According to TechCrunch , openSNP had nearly 13,000 users and had identified over 7,500 genomes.

While there are still opportunities to develop and continue the legacy of the democratic project, Greshake Tzovaras also raised concern over the current use of genetic data, such as for law enforcement and “DNA phenotyping”, sustainability challenges, and political developments.

“Across the globe, there is a rise in far-right and other authoritarian governments,” added Greshake Tzovaras. “While they are cracking down on free and open societies, they are also dedicated to replacing scientific thought and reasoning with pseudoscience across disciplines.”

Hackers Found Using Legitimate Security Tools During Their Attacks - 2

Image by Joan Gamell, from Unsplash

Hackers Found Using Legitimate Security Tools During Their Attacks

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

Ransomware gangs have improved their avoidance of detection through “EDR killers,” tools designed to disable security systems early in their attacks.

In a rush? Here are the quick facts:

  • Ransomware groups disable security tools early using “EDR killers.”
  • Attackers use legitimate tools such as HRSword to conduct their attacks.
  • Security tools that are not properly set up create openings for attackers to target companies.

The Register reports that Cisco Talos researchers observed ransomware groups successfully deactivating security protections during almost half of the examined cases in 2024. Through this method hackers allow hackers to stay hidden for longer while they carry out data theft, and distribute ransomware more effectively.

According to Kendall McKay, strategic lead at Talos, attackers implement multiple EDR killers throughout each operation, as reported by The Register. Cybercriminals employ

EDRSilencer and EDRSandblast and EDRKillShifter and Terminator tools to deactivate security defenses.

The Register reports that some ransomware programs, like EDRKillShifter, take advantage of Windows driver vulnerabilities to shut down security applications.

The Register explains that the malware first emerged with the RansomHub gang in August 2024, and has since been used by other ransomware groups, including Medusa, BianLian, and Play.

“The goal is typically the same: kill EDR protections, allow the criminals to remain undetected for longer in the compromised networks, and then help them to steal sensitive data and deploy ransomware before being caught and kicked out,” McKay said, as reported by The Register.

This attack makes recovery of affected systems more complicated. As a result, organizations sometimes need to wipe and rebuild their networks entirely.

The Register says that not all EDR killers are malware. Research conducted by Talos showed that ransomware gangs often carry out attacks by using legitimate tools .

One example is HRSword, a commercial product developed by China-based Huorong Network Technology. Designed to monitor system activity, hackers have repurposed it to disable security software. “It’s a legitimate commercial tool, but now threat actors are co-opting it for their own purposes,” McKay said, as reported by The Register.

The attackers exploit security tools which were not properly set up. Security products function without customization in numerous organizations which creates security risks for their systems, says The Register.. Some organizations set their endpoint detection and response tools to “audit-only” mode, meaning threats are detected but not blocked.

“This was perhaps the most concerning for us, because it’s such a low-hanging fruit and something that can easily be prevented by organizations,” McKay pointed out as reported by The Register.