Wednesday, February 26, 2025
HomeCyber AttackHackers Exploited Facebook Zero-Day Flaw & Stolen 50 Million Accounts Access Tokens

Hackers Exploited Facebook Zero-Day Flaw & Stolen 50 Million Accounts Access Tokens

Published on

SIEM as a Service

Follow Us on Google News

Facebook security breach, hackers steal more than 50 million accounts access tokens by exploiting a bug in View As a feature.

The access token contains information such as security credentials for a login session, user identity, and the permission. By having the access tokens hackers can take over user accounts without account passwords and without completing two-factor authentication.

Facebook Security Breach Noticed

Facebook noticed the Bug on September 25 and they said the bug was fixed now and reported to law enforcement agencies. Facebook not revealed any technical details of the vulnerability.

The social media giant said “we have reset the access tokens of the almost 50 million accounts and as a precautionary step of resetting access tokens for another 40 million accounts that have been subject to a “View As” look-up in the last year,” reads Facebook security breach update.

So as the token reset the affected users need to lo back in with the Facebook or any other apps that use Facebook login.

Facebook made changes with code for View as a feature while introducing video uploading feature in July 2017 and the attackers found the vulnerability in the code and use it to get the access tokens.

Temporarily facebook turned off View as a feature, that lets you see how your profile looks for others.

The social media giant said we just started the investigation, we have yet to determine whether these accounts were misused or any information accessed. We also don’t know who’s behind these attacks or where they’re based.

Facebook under heavy criticism after Cambridge Analytica scandal which impacts more than 87 Million users and thereafter many Quiz app NameTests spotted exposing more than 120 million users personal data publically in third-party sites.

In a recent analysis report, more than 25,000 it was found that Malicious Apps Use Facebook APIs to Obtain a Range of Information.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...