Thursday, February 27, 2025
HomeFACEBOOKFacebook Taken Down Number of Political ads due to Technical Flaws in...

Facebook Taken Down Number of Political ads due to Technical Flaws in their System

Published on

SIEM as a Service

Follow Us on Google News

Facebook on Thursday acknowledged that a technical error in its systems caused a variety of ads from both political parties to be improperly paused.

The error stems from a policy change that Facebook announced in early September to stop any new political ads in the week before the United States presidential election scheduled for Tuesday, November 3, 2020. This restriction took effect at 12:01 AM PT on October 27th.

Facebook issued an update saying we began restricting new political and issue ads before next week’s election so that all political ads would be searchable in our public ad library beforehand of polling day.

After the restriction took effect, the bulk of political and issue ads are unaffected however we have identified a variety of unanticipated issues affecting campaigns of both political parties.

Some were technical problems, others were because advertisers didn’t understand the instructions we provided about when and how to make changes to ad targeting, Facebook said.

“We have implemented changes to repair these issues, and most political ads are now running with no problems. “

We are continuing to monitor closely to make sure all of our fixes work and ads are running as intended well in advance of the election.

Technical Flaw

Facebook mentions ‘Technical flaws in our systems’ ability to detect that an ad has been properly recorded within the Ad Library caused a variety of ads to be paused improperly and prevented advertisers from making permissible changes to their ads. This impacted a little proportion of the ads about politics and social issues in our system.

Investigation

After investigating these technical issues, “we detected a variety of ads were paused because advertisers had made changes to the targeting shortly before the deadline, which had created new ads that needed to travel through approval and delivery before the deadline passed.”

While speaking with advertisers and reviewing our instructions again, we realized that we could have been more clear on edit targeting during or before the restriction period, Facebook said.

Facebook confirms that “No ad was paused or rejected by an individual or due to partisan consideration”.

Most of the problems are fully addressed except for any advertisers still facing issues; there are several steps they can take to help their ads reach people.

They can also pause ads and resume them as long as those ads delivered an impact before the restriction took effect. The company ensures to resolve any problems which will come up as quickly as possible.

You can follow us on Linkedin, TwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read

Facebook Hacking made Easy and Convenient with Numerous Hacking Apps

Facebook Announced New Privacy and Security Feature for Messenger

Latest articles

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free”...

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the...

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging...

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft

A newly discovered phishing campaign targeting Facebook users has been identified by researchers at...

New Facebook Fake Copyright Notices to Steal Your FB Accounts

A newly discovered phishing campaign is using fake Facebook copyright infringement notices to trick...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...