Friday, June 13, 2025
HomeCyber AttackHackers Exploited Facebook Zero-Day Flaw & Stolen 50 Million Accounts Access Tokens

Hackers Exploited Facebook Zero-Day Flaw & Stolen 50 Million Accounts Access Tokens

Published on

SIEM as a Service

Follow Us on Google News

Facebook security breach, hackers steal more than 50 million accounts access tokens by exploiting a bug in View As a feature.

The access token contains information such as security credentials for a login session, user identity, and the permission. By having the access tokens hackers can take over user accounts without account passwords and without completing two-factor authentication.

Facebook Security Breach Noticed

Facebook noticed the Bug on September 25 and they said the bug was fixed now and reported to law enforcement agencies. Facebook not revealed any technical details of the vulnerability.

- Advertisement - Google News

The social media giant said “we have reset the access tokens of the almost 50 million accounts and as a precautionary step of resetting access tokens for another 40 million accounts that have been subject to a “View As” look-up in the last year,” reads Facebook security breach update.

So as the token reset the affected users need to lo back in with the Facebook or any other apps that use Facebook login.

Facebook made changes with code for View as a feature while introducing video uploading feature in July 2017 and the attackers found the vulnerability in the code and use it to get the access tokens.

Temporarily facebook turned off View as a feature, that lets you see how your profile looks for others.

The social media giant said we just started the investigation, we have yet to determine whether these accounts were misused or any information accessed. We also don’t know who’s behind these attacks or where they’re based.

Facebook under heavy criticism after Cambridge Analytica scandal which impacts more than 87 Million users and thereafter many Quiz app NameTests spotted exposing more than 120 million users personal data publically in third-party sites.

In a recent analysis report, more than 25,000 it was found that Malicious Apps Use Facebook APIs to Obtain a Range of Information.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Major Outage Hits Google Cloud and Linked Cloudflare Services, Thousands Affected

On June 12, 2025, concurrent infrastructure failures at Cloudflare and Google caused widespread service...

TokenBreak Exploit Tricks AI Models Using Minimal Input Changes

HiddenLayer’s security research team has uncovered TokenBreak, a novel attack technique that bypasses AI...

WebDAV Remote Code Execution 0-Day Actively Exploited — PoC Released

A critical zero-day vulnerability in Microsoft’s Web Distributed Authoring and Versioning (WebDAV) protocol, tracked...

Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware

Recent investigations by Check Point Research have uncovered a sophisticated malware campaign that leverages...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Major Outage Hits Google Cloud and Linked Cloudflare Services, Thousands Affected

On June 12, 2025, concurrent infrastructure failures at Cloudflare and Google caused widespread service...

TokenBreak Exploit Tricks AI Models Using Minimal Input Changes

HiddenLayer’s security research team has uncovered TokenBreak, a novel attack technique that bypasses AI...

WebDAV Remote Code Execution 0-Day Actively Exploited — PoC Released

A critical zero-day vulnerability in Microsoft’s Web Distributed Authoring and Versioning (WebDAV) protocol, tracked...