This article originally appeared on ZDNet.

on Friday disclosed a of its that affected almost 50 million . The social networking giant said that attackers exploited a in Facebook’s code that let them steal access tokens when users switched over to a public profile view via the “View As” feature. The access tokens allowed the attackers to take over user accounts — however it’s still unclear whether user data was accessed and misused.

Facebook said it has secured its network and user accounts since engineering discovered the on September 25. The vulnerability was fixed and Facebook said it has notified law enforcement.

SEE: Network security policy (Tech Pro Research)

Meantime, the has reset the access tokens on all of the affected user accounts, as well as on another 40 million accounts that were subject to a “View As” look-up in the last year.

Anyone impacted by the reset will need to log back in to Facebook and on any that use Facebook Login. Once logged back in, affected users will see a notification at the top of News Feed alerting them to the incident.

Facebook has also disabled the “View As” feature while it conducts a security review.

“Since we’ve only just started our investigation, we have yet to determine whether these accounts were misused or any information accessed,” Facebook said in a blog post. “We also don’t know who’s behind these attacks or where they’re based. We’re working hard to better understand these details — and we will update this post when we have more information, or if the facts change. In addition, if we find more affected accounts, we will immediately reset their access tokens.”

Also see

Source link


Please enter your comment!
Please enter your name here