Friday, March 21, 2025
HomeComputer SecurityA Chrome Bug Allowed Hackers to Extract Your Private Data From Facebook...

A Chrome Bug Allowed Hackers to Extract Your Private Data From Facebook and Other Web Platforms

Published on

SIEM as a Service

Follow Us on Google News

A new chrome bug allows attackers to extract private data that stored on Facebook and from other web platforms. The bug affects all the browsers including Chrome that use Blink browser engine. According to StatCounter, Chrome used by 59% of the Internet population.

The chrome bug takes advantage over the Audio/Video HTML tags that used in generating the requests from the target source. Imperva security researcher Ron Masas uncovered the bug with video and audio tags while researching with different HTML tags for cross-origin communications.

Cross-Origin Resource Sharing is a mechanism that uses HTTP headers to instruct web browsers and servers on how to utilize the cross-domain resources. It defines a way on how to request remote URLs when they have privileged.

Chrome Bug To Extract Private Data

Ron Masas found that the Audio/Video HTML failed to validate the content types, an attacker could inject hidden video or audio tags that request the crafted posts from Facebook that posted based on the restriction techniques.

When the user visits the attacker’s webpage which contains hidden video or audio tags that would request Facebook posts and by analyzing the request of which specific posts are called for the user the attackers able to extract the logged social networking individual user age from Facebook regardless of privacy settings within seconds.

Ron Masas created a javascript function that returns an estimation of a resource size, see “estimate_cross_origin_resource

Chrome Bug

An attacker can create crafted Facebook posts for all possible age based by using the Audience Restriction options that limits the visibility of the posts based on the age, location, gender, and other properties.

Chrome Bug

“With several scripts running at once each testing a different and unique restriction, the bad actor can relatively quickly mine a good amount of private data about the user. With the e-commerce or a SaaS site attackers even could extract login email address to correlate the private data for extensive and intrusive profiling.”

Now the issue has been fixed with Chrome 68 and users are strongly recommended to update with the latest version of chrome browser. The vulnerability tracked as CVE-2018-6177.

Also Read

Microsoft Edge Browser Vulnerability Allows Malicious Hackers Steal Your Computer Local Files

Let’s Encrypt Root Certificate Now Directly Trusted by Microsoft and all Major Root Programs

Hackers Distributing FELIXROOT Backdoor Malware using Microsoft Office Vulnerabilities

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Over 150 US Government Database Servers Vulnerable to Internet Exposure

A recent open-source investigation has uncovered one of the largest exposures of US government...

Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now

A concerning development has emerged with the active exploitation of Apache Tomcat servers through...

UAT-5918 Hackers Exploit N-Day Vulnerabilities in Exposed Web and Application Servers

A recent cybersecurity threat, identified as UAT-5918, has been actively targeting entities in Taiwan,...

MEDUSA Ransomware Deploys Malicious ABYSSWORKER Driver to Disable EDR

In a recent analysis by Elastic Security Labs, a malicious driver known as ABYSSWORKER...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and...