What you need to do about the recent Facebook security breach:
- Nothing.
What you donât need to do about the recent Facebook security breach:
- Donât rush to change your password. Passwords were not affected during the breach, so theyâre as safe as youâve made them.
- Donât panic. Even if you find yourself logged out of Facebook for some reason, Facebook says thereâs no need to worry; it will have already reset the authentication token for you so that nobody but you can gain access to your account. Youâll need to log in again by entering your password and 2FA code (if you have enabled it), but thatâs all.
- Donât delete your Facebook account. Well, of course you can always do that, but this breach is not a reason to be quite that worried.
Hereâs what actually happened
On September 28, Facebook published a security update explaining that the companyâs engineering team has discovered a security issue affecting almost 50 million accounts. The bottom line is that somebody performed a rather sophisticated attack that allowed them to steal 50 million user access tokens.
An access token is, as Facebook describes it, basically a key to your account. If a person has it, Facebook considers that person authorized to enter that account and doesnât request login, password, and 2FA codes. So, having stolen 50,000,000 user access tokens, the malefactors could potentially access those 50,000,000 accounts. But that doesnât mean they got access to your passwords or somehow broke the two-factor authentication mechanism. Your password is secure and 2FA is still working as intended. But stealing a token is a way to bypass those defenses.
Facebook explains that investigation of the incident is in the very early stages, but for now they suspect that somebody found a vulnerability in their âView asâ feature and exploited it, gaining access to 50 million account tokens. Thatâs why they have turned the feature off, reset the user authentication tokens for those accounts, and are in the process of resetting those tokens for another 40 million users who have used this feature in the past year. The last part seems like just a precaution, but at the moment, they can hardly be too careful.
When the token is reset, the person who has it can no longer access the account and will need to log in again. The malefactors donât have your login or password, so even if you were affected initially, they can no longer pretend to be you and access the account.
Facebook promises to update the post once itâs clear what exactly happened and whether any of the affected accounts were somehow misused, but for now we suggest doing what we described in the beginning of the post: nothing. Thereâs nothing you can do at the moment, so donât panic. When the situation clears up some more, if users can take any useful actions, weâll let you know.
Source: kaspersky.com