Thursday, July 18, 2024
EHA

Here is How to Find that Your Facebook Account Affected With Recent Massive Facebook Hack

Facebook announced a massive security breach on September 28, 2018, initially it was said more than 50 million accounts access tokens was stolen by exploiting the software vulnerability in “View As” feature between July 2017 and September 2018.

Now after further investigation, Facebook now announced that attackers have stolen 29 million Facebook accounts.

The bug was discovered on September 25, 2018, and the attackers have exploited a vulnerability caused by the complex interaction of three bugs in our system to obtain access tokens.

15 million people – name and contact details (phone number, email, or both, depending on what people had on their profiles).

14 million people – the same two sets of information, as well as other details people had on their profiles. This included username, gender, locale/language, relationship status, religion, hometown, self-reported current city, birth date, device types used to access Facebook, education, work, the last 10 places they checked into or were tagged in, website, people or Pages they follow, and the 15 most recent searches.

Facebook Account Affected

Now you can check that your Facebook account affected by this security issue. Facebook set up a page to check that your account was compromised by the security breach, you can visit the page to check the status.

“Based on what we’ve learned so far, your Facebook account has not been impacted by this security incident. If we find more Facebook accounts were impacted, we will reset their access tokens and notify those accounts.”

If you got this message then nothing to worry, if you account affected then Facebook tell you what kind of details the hackers stole.

Changing the password is not a fix, because the passwords are not compromised. Now as the hackers having your personal data you should carefully handle the spam calls, Email, and messages. The Risk of spear-phishing attacks may on the rise.

Last week Google announced Google+ shut down following the security breach that exposed 500,000 Google+ accounts. The bug allows third-party developers to access user’s name, email address, occupation, gender, and age.

Website

Latest articles

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...

Cybercriminals Exploit Attack on Donald Trump for Crypto Scams

Researchers at Bitdefender Labs remain ever-vigilant, informing users about the latest scams and internet...

New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites

HTTP Request Smuggling is a flaw in web security that is derived from variations...

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware

The Volcano Demon group has been discovered spreading a new ransomware called LukaLocker, which...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles