A Facebook executive Friday said the company has “not ruled out the possibility of smaller, lower level access attempts during the time of the exposure,” but downgraded the number of users whose access tokens were stolen during the breach from 50 million to 30 million.
The attackers, who “already controlled a set of accounts, which were connected to Facebook friends” employed “an automated technique to move from account to account so they could steal the access tokens of those friends, and for friends of those friends, and so on, totaling about 400,000 people,” Facebook Vice President of Product Management Guy Rosen wrote in a security update, “In the process, however, this technique automatically loaded those accounts’ Facebook profiles, mirroring what these 400,000 people would have seen when looking at their own profiles.”
That led to the pilfering of access tokens for about 30 million people.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.