Friday, 12 October 2018

Attackers exploited 3 bugs and Facebook’s once-vaunted social graph to steal 29 million users’ data

Facebook provided an update on the investigation into the massive data exploit it reported to users on September 28. While the overall number of people affected is lower than previously thought (30 million rather than 50 million), that’s about the only good news.

How it happened. The attackers were able to take advantage of a combination of three separate software bugs to get Facebook access tokens (used to allow users to stay logged into the app) and take over users’ accounts. They stole the tokens of some 30 million Facebook users.

Network effect downfall. As with the Cambridge Analytica scandal, Facebook’s social graph opened up access to Facebook friends and allowed the attackers to take advantage of the network effect. Starting with their own set of friends, “(the attackers) used an automated technique to move from account to account so they could steal the access tokens of those friends, and for friends of those friends, and so on, totaling about 400,000 people,” wrote Guy Rosen, Facebook VP of product management, in a blog post. They then accessed lists of friends from a set of that initial 400,000 to gain access to the tokens of the roughly 30 million people.

  • For those 400,000 profiles, the attackers could access their timeline posts, lists of friends, Groups they belong to and names of recent Messenger conversations. Messages sent to Pages were also exposed if their Page Admins were part of that group.
  • 15 million people had their names and contact details (phone number, email or both) accessed.
  • 14 million people had their names, contact details and “other details people had on their profiles.” That list of other details is extensive: username, gender, locale/language, relationship status, religion, hometown, self-reported current city, birthdate, device types used to access Facebook, education, work, the last 10 places they checked into or were tagged in, website, people or Pages they follow, and the 15 most recent searches.
  • Another 1 million people had their tokens stolen but their information wasn’t accessed, said Facebook.

Who did it? Facebook says it is working with the FBI and has been asked “not to discuss who may be behind this attack.”

Why it matters. The consequences for people affected could last years, including compromised two-factor authentication, identity theft and ongoing hacking concerns. Facebook is already facing regulatory investigations in the EU and in the U.S. over its data handling practices. After two very, very bad years, this exploit will bring even more regulatory scrutiny and further erode users’ trust in the company. Nothing so far seems to have truly shaken advertisers away. If this triggers more user abandoment, advertisers could follow.


About The Author

Ginny Marvin is Third Door Media’s Editor-in-Chief, managing day-to-day editorial operations across all of our publications. Ginny writes about paid online marketing topics including paid search, paid social, display and retargeting for Search Engine Land, Marketing Land and MarTech Today. With more than 15 years of marketing experience, she has held both in-house and agency management positions. She can be found on Twitter as @ginnymarvin.

This marketing news is not the copyright of Scott.Services – please click here to see the original source of this article. Author: Ginny Marvin

For more SEO, PPC, internet marketing news please check out https://news.scott.services

Why not check out our SEO, PPC marketing services at https://www.scott.services

We’re also on:
https://www.facebook.com/scottdotservices/
https://twitter.com/scottdsmith
https://plus.google.com/112865305341039147737

The post Attackers exploited 3 bugs and Facebook’s once-vaunted social graph to steal 29 million users’ data appeared first on Scott.Services Online Marketing News.



source https://news.scott.services/attackers-exploited-3-bugs-and-facebooks-once-vaunted-social-graph-to-steal-29-million-users-data/

No comments:

Post a Comment