Thursday, February 27, 2025
HomeComputer SecurityA Chrome Bug Allowed Hackers to Extract Your Private Data From Facebook...

A Chrome Bug Allowed Hackers to Extract Your Private Data From Facebook and Other Web Platforms

Published on

SIEM as a Service

Follow Us on Google News

A new chrome bug allows attackers to extract private data that stored on Facebook and from other web platforms. The bug affects all the browsers including Chrome that use Blink browser engine. According to StatCounter, Chrome used by 59% of the Internet population.

The chrome bug takes advantage over the Audio/Video HTML tags that used in generating the requests from the target source. Imperva security researcher Ron Masas uncovered the bug with video and audio tags while researching with different HTML tags for cross-origin communications.

Cross-Origin Resource Sharing is a mechanism that uses HTTP headers to instruct web browsers and servers on how to utilize the cross-domain resources. It defines a way on how to request remote URLs when they have privileged.

Chrome Bug To Extract Private Data

Ron Masas found that the Audio/Video HTML failed to validate the content types, an attacker could inject hidden video or audio tags that request the crafted posts from Facebook that posted based on the restriction techniques.

When the user visits the attacker’s webpage which contains hidden video or audio tags that would request Facebook posts and by analyzing the request of which specific posts are called for the user the attackers able to extract the logged social networking individual user age from Facebook regardless of privacy settings within seconds.

Ron Masas created a javascript function that returns an estimation of a resource size, see “estimate_cross_origin_resource

Chrome Bug

An attacker can create crafted Facebook posts for all possible age based by using the Audience Restriction options that limits the visibility of the posts based on the age, location, gender, and other properties.

Chrome Bug

“With several scripts running at once each testing a different and unique restriction, the bad actor can relatively quickly mine a good amount of private data about the user. With the e-commerce or a SaaS site attackers even could extract login email address to correlate the private data for extensive and intrusive profiling.”

Now the issue has been fixed with Chrome 68 and users are strongly recommended to update with the latest version of chrome browser. The vulnerability tracked as CVE-2018-6177.

Also Read

Microsoft Edge Browser Vulnerability Allows Malicious Hackers Steal Your Computer Local Files

Let’s Encrypt Root Certificate Now Directly Trusted by Microsoft and all Major Root Programs

Hackers Distributing FELIXROOT Backdoor Malware using Microsoft Office Vulnerabilities

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and...