Sign up for our weekly newsletter!
REGISTER NOW |
||
|
||
Login With Facebook & Watch Your Personal Data Leak![]() Larry Loeb, Author, 4/20/2018
It's now common for websites to use a "Login with Facebook" button on their sites as a convenience for users. However, security researchers from Princeton University have discovered that some advertising and analytics services are siphoning user data from these pages when such a button is present. In their posting, Princeton's Steven Englehardt, Gunes Acar and Arvind Narayanan found insecure design practices allowed at least seven third parties to abuse the websites' access to Facebook user data on 434 of the top 1 million sites. What happens is that the user clicks the Facebook button, and the Facebook servers will respond with the Facebook account data, which has been previously authorized for that specific site.
![]() (Source: Pixabay)
However, there may be third-party JavaScript code on the login page, which can intercept this authorized data and extract user details from it. Trusted websites can request the user's email address and "public profile" -- name, age range, gender, locale and profile photo -- without triggering a review by Facebook. Once the user allows the website to access Facebook, the researchers found that any third-party Javascript embedded in the page can also retrieve the user's Facebook information as if they were the website. In their report, the three researchers noted: "We believe the websites embedding these scripts are likely unaware of this particular data access." Even though the user ID collected through the Facebook API will be specific to the requesting website -- this would limit cross-site tracking -- the IDs can be used to retrieve the global Facebook ID, user's profile photo and other public profile information. This information can then be used to identify and track users across websites and devices. Another misuse of this Facebook login that the researchers found could trick a user to logging in with Facebook without realizing that they were doing so. They discovered that there was a hidden iframe that was injected, and this would pass the user's information to the embedding script indiscriminately. That meant that any malicious site could have used that iframe to identify visitors.
The researchers think this is a bigger problem than just one that can be laid at Facebook's feet. They wrote in their blog: This unintended exposure of Facebook data to third parties is not due to a bug in Facebook's Login feature. Rather, it is due to the lack of security boundaries between the first-party and third-party scripts in today's web. The Princeton team realize that what they have described is likely to exist for most social login providers and on mobile devices. Indeed, they found scripts which appear to grab user identifiers from the Google Plus API, as well as from the Russian social media site VK, but did not go into detail about them. It's the social network that will ultimately have to deal with these problems. Tightening the use of app-scoped IDs may help. Related posts:
— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek. |
Attackers have already begun to breach security at the BIOS level, according to a new report on BIOS security from Forrester Consulting.
The Sophos Managed Threat Response team found out that, where the Snatch ransomware is concerned, things just more ugly.
The Federal Bureau of Investigation's office in Portland, Ore., uses 'Tech Tuesday' to offer IoT security advice.
One of the most prevalent threats to the financial sector, the Dridex Trojan, was the subject of a recent alert.
Aviatrix, an enterprise VPN company with customers that include NASA, Shell and BT, has recently dealt with a vulnerability that was uncovered by Immersive Labs researcher and content engineer Alex Seymour.
Information Resources
upcoming Webinars
ARCHIVED
Top Tips for Blocking pwned [email protected]$$wOrds in Your Organization
Tuesday, October 29, 2019
12 p.m. New York/ 4:00 p.m. London Podcasts
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Podcast: Digital Transformation, SD-WAN & Optimal Security
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security. ![]() like us on facebook
|
|
![]() |
||
![]() |
Security Now
About Us
Contact Us
Help
Register
Events
Supporting Partners
Twitter
Facebook
RSS
Copyright © 2019 Light Reading, part of Informa Tech, a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use in partnership with
|