- George R.R. Martin clarifies some things about the ‘Game of Thrones’ Targaryen prequel 12 Months Ago
- Bill Mitchell, the Trump-loving QAnon scammer, is pushing ammunition for a civil war 12 Months Ago
- How to stream Tigres vs. Cruz Azul in the Leagues Cup final 12 Months Ago
- How to stream Bayern Munich vs. Belgrade Red Star in Champions League action 12 Months Ago
- HBO Max gains the streaming rights to ‘The Big Bang Theory’ 12 Months Ago
- Everyone hates this Russian rapper’s pro-Putin music video Today 10:34 AM
- Skull fire logs are here to make you look like a gleeful murderer Today 10:30 AM
- High school cheerleading team put on probation for waving Trump banner during a game Today 10:12 AM
- ‘Battlestar Galactica’ is getting a reboot from the creator of ‘Mr. Robot’ Today 9:17 AM
- Sean Spicer is already alleging judges are out to get him on DWTS Today 8:52 AM
- Netflix’s ‘Jupiter’s Legacy’ loses showrunner halfway through filming Today 7:36 AM
- ‘Disenchantment’ season 2 starts strong but falls into familiar trappings Today 7:00 AM
- Are Ben Shapiro fans organizing against his opponents on Twitter? Today 6:30 AM
- iPhone overloaded? Here’s how to cancel app subscriptions Monday 11:02 PM
- Fan-created ‘app’ lets users experience the final moments of the ill-fated Jeremy Renner app Monday 10:00 PM
Facebook announced Friday that it discovered a data breach affecting at least 50 million users. While the company has figured out how the attackers exploited the site, the identity and location of this Facebook data breach, which happened on Tuesday, Sept. 25, are still under investigation.
The hackers were able to penetrate Facebook thanks to a bug in its “view as” tool. This feature lets users view their Facebook profile as if they were a stranger or a particular friend—a security measure for checking profile privacy settings.
According to the New York Times, that bug was paired with another in the app’s video-uploading system (a happy birthday video uploading tool, to be specific). This let attackers steal access tokens to user accounts. (Facebook explains that access tokens “are the equivalent of digital keys that keep people logged in to Facebook so they don’t need to re-enter their password every time they use the app.”) Once the hackers obtained these keys, they gained the ability to take over other user accounts.
Since discovering this Facebook data breach, the company has fixed the vulnerability. As a precautionary measure, the company also logged out and reset the access tokens of 90 million users Friday morning, requiring them to log back in and reconnect Facebook-connected apps. Once affected users log back in, a notice at the top of their feed will explain the situation. Users don’t need to reset their passwords—at this point, there’s no evidence that passwords were compromised, only user access tokens.
Facebook has reported the data breach to authorities as it continues to investigate its origins and extent. In the meantime, it’s switched off the “view as” feature while it undergoes a security review.
“Since we’ve only just started our investigation, we have yet to determine whether these accounts were misused or any information accessed,” Facebook VP of Product Management Guy Rosen wrote in a blog post. “We also don’t know who’s behind these attacks or where they’re based. We’re working hard to better understand these details.”
Since the Cambridge Analytica scandal surfaced earlier this year, Facebook has been scrambling to polish its image and regain user trust. It’s run a series of ads apologizing for its past behavior, and made efforts to make its privacy controls more simple and clear to understand.
H/T the New York Times
Christina Bonnington is a tech reporter who specializes in consumer gadgets, apps, and the trends shaping the technology industry. Her work has also appeared in Gizmodo, Wired, Refinery29, Slate, Bicycling, and Outside Magazine. She is based in the San Francisco Bay Area and has a background in electrical engineering.