Change your Facebook password right now

Thursday - 21/03/2019 23:49
Facebook has let passwords go exposed.Source:AFP
Facebook has let passwords go exposed.Source:AFP
Facebook left millions of user passwords readable by its employees for years, the company admitted after a security researcher exposed the lapse.

Facebook left millions of user passwords readable by its employees for years, the company admitted after a security researcher exposed the lapse. 

By storing passwords in readable plain text, Facebook violated fundamental computer-security practices. Those call for organisations and websites to save passwords in a scrambled form that makes it almost impossible to recover the original text.

“There is no valid reason why anyone in an organisation, especially the size of Facebook, needs to have access to users’ passwords in plain text,” said cybersecurity expert Andrei Barysevich of Recorded Future.

Facebook said there is no evidence its employees abused access to this data. But thousands of employees could have searched them. The company said the passwords were stored on internal company servers, where no outsiders could access them. The incident reveals yet another huge and basic oversight at a company that insists it is a responsible guardian for the personal data of its 2.2 billion users worldwide.
 

‘It’s horrendous’: NZ slams Facebook

Social media giants vow to target abusers

How we can fix the toxic side of social media
 

A large number of people are stepping back from Facebook in the wake of recent scandals over the social network's handling of private user data.
A large number of people are stepping back from Facebook in the wake of recent scandals over the social network's handling of private user data.Source:AFP

 

The security blog KrebsOnSecurity said Facebook may have left the passwords of some 600 million Facebook users vulnerable. In a blog post, Facebook said it will likely notify “hundreds of millions” of Facebook Lite users, millions of Facebook users and tens of thousands of Instagram users that their passwords were stored in plain text.

Facebook Lite is a version designed for people with older phones or low-speed internet connections. It is used primarily in developing countries. Last week, Facebook CEO Mark Zuckerberg touted a new “privacy-focused vision” for the social network that would emphasise private communication over public sharing. The company wants to encourage small groups of people to carry on encrypted conversations that neither Facebook nor any other outsider can read. The fact that the company couldn’t manage to do something as simple as encrypting passwords, however, raises questions about its ability to manage more complex encryption issues — such in messaging — flawlessly.

Facebook said it discovered the problem in January. But security researcher Brian Krebs wrote that in some cases the passwords had been stored in plain text since 2012. Facebook Lite launched in 2015 and Facebook bought Instagram in 2012.


Social media let massacre video stay up for 12 hours

Fallout from Facebook attack footage continues
 

Change your password on Facebook now. Photographer: Luke MacGregor/Bloomberg
Change your password on Facebook now. Photographer: Luke MacGregor/BloombergSource:Bloomberg

 

Recorded Future’s Barysevich said he could not recall any major company caught leaving so many passwords exposed internally. He said he’s seen a number of instances where much smaller organisations made such information readily available — not just to programmers but also to customer support teams. Security analyst Troy Hunt, who runs the “haveibeenpwned.com” data breach website, said that the situation is embarrassing for Facebook, but that there’s no serious, practical impact unless an adversary gained access to the passwords. But Facebook has had major breaches, most recently in September when attackers accessed some 29 million accounts.

Jake Williams, president of Rendition Infosec, said storing passwords in plain text is “unfortunately more common than most of the industry talks about” and tends to happen when developers are trying to rid a system of bugs. He said the Facebook blog post suggests storing passwords in plain text may have been “a sanctioned practice,” although he said it’s also possible a “rogue development team” was to blame.

Hunt and Krebs both likened Facebook’s failure to similar stumbles last year on a far smaller scale at Twitter and Github; the latter is a site where developers store code and track projects. In those cases, software bugs were blamed for accidentally storing plaintext passwords in internal logs.

Facebook’s normal procedure for passwords is to store them encoded, the company noted Thursday in its blog post.

That’s good to know, although Facebook engineers apparently added code that defeated the safeguard, said security researcher Rob Graham. “They have all the proper locks on the doors, but somebody left the window open,” he said.

Source:

 Keywords: Facebook

Total notes of this article: 0 in 0 rating

Click on stars to rate this article

  Reader Comments

Newer articles

Older articles

In Case You Missed it

Advertisement

You did not use the site, Click here to remain logged. Timeout: 60 second