Facebook Reveals Massive Breach of up to 50 Million User Accounts

If you find this useful please share it!


If you were required to re-enter your password in order to log in to Facebook today (28 September 2018), there’s a good reason: Facebook this morning revealed that it had suffered a massive breach, compromising as many as 50 million user accounts.

So if you were required to log in again today, you are one of 90 million Facebook users that was forced to re-enter their Facebook credentials.

Why Facebook required nearly twice as many users as those they are estimating were effected to re-enter their credentials is unclear, but we assume it is because a) they are estimating how many were affected based on certain metrics (unknown to us) and b) they don’t actually yet know who all was directly affected, and so are erring on the side of over-inclusion (not a bad thing).


According to the New York Times, Facebook found that “attackers had exploited a feature in Facebook’s code that allowed them to take over user accounts. Facebook fixed the vulnerability and notified law enforcement officials.”

The BBC says that the exploited feature was the feature known as “View As”, explaining that View As “is a privacy feature that allows people to see what their own profile looks to other users, making it clear what information is viewable to their friends, friends of friends, or the public.”

(Article continues below)
Get notified of new Internet Patrol articles for free!
Or Read Internet Patrol Articles Right in Your Inbox!
as Soon as They are Published! Only $1 a Month!

Imagine being able to read full articles right in your email, or on your phone, without ever having to click through to the website unless you want to! Just $1 a month and you can cancel at any time!
Facebook Reveals Massive Breach of up to 50 Million User Accounts

According to Facebook’s head of security, Guy Rosen, the hackers found “multiple bugs” (eep!) which allowed them to take over user accounts.

The attackers did not get passwords, but rather access tokens. While they are not technically cookies, they are similar in the way that they work inasmuch as they are what keeps you logged in to Facebook rather than your having to re-enter your password every time you go to Facebook. So if you can imagine that a cookie-like thing was accessed, then you just need to generate a new cookie-like thing, basically voiding the previous one which the hackers may have accessed.

This is why you had to log back in to Facebook today – because Facebook logged you out in order to clear out the compromised access token for your account.

Explains Rosen, “Access tokens are the equivalent of digital keys that keep people logged in to Facebook so they don’t need to re-enter their password every time they use the app.”

We know you're sick of ads on websites. But we still need to pay to keep the lights on for you. So instead of huge ads and video ads, we use smaller, plainer ads. Still, if you'd like to support the Internet Patrol but not the ads, please consider supporting us here:
Donate via Paypal
Other Amount:

With 2billion active users per month, 50million is ‘just’ 2.5% of all active Facebook user accounts, but somehow that’s not much comfort.

Said Facebook CEO Mark Zuckerberg, of the incident, “This is a really serious security issue. This underscores there are just constant attacks from people who are trying to take over accounts and steal information from our community. This is going to be an ongoing effort.”

No Paywall Here!
The Internet Patrol is and always has been free. We don't hide our articles behind a paywall, or restrict the number of articles you can read in a month if you don't give us money. That said, it does cost us money to run the site, so if something you read here was helpful or useful, won't you consider donating something to help keep the Internet Patrol free? Thank you!

Facebook Reveals Massive Breach of up to 50 Million User Accounts

Get notified of new Internet Patrol articles!

If you find this useful please share it!

Leave a Reply

Your email address will not be published. Required fields are marked *