Saturday, June 25, 2022
  • A “whole-of-state” approach to cybersecurity
  • Hackers Are Still Exploiting Log4Shell Vulnerability, Warns CISA
  • USENIX Enigma 2022 – Mallory Knodel’s ‘You Can’t Always Get What You Want / But You Get What You Need: Moderating E2EE’
  • Peer Groups
  • Privacy Access Token

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Data Security SBN News Security Bloggers Network Threats & Breaches 

Home » Cybersecurity » Data Security » How to check if your Facebook account was hacked and what the hackers have on you

SBN

How to check if your Facebook account was hacked and what the hackers have on you

by Filip Truta on October 15, 2018

Following a massive breach that compromised tens of millions of accounts, Facebook has started sending out custom messages to inform people if or how they were impacted. Users who have yet to receive a custom notification from the social network can manually check whether their account got hacked, and what data might have been leaked. Here’s how.

DevOps Connect:DevSecOps @ RSAC 2022

First, some background. As many of you probably read in the news last week, between September 14 and September 27 an unknown attacker used daisy-chained vulnerabilities in the platform’s View As feature to snatch authentication tokens of tens of millions of users.

The initial count was 50 million to 90 million compromised accounts. After further investigation, Facebook said only 30 million accounts were in fact compromised.

In an update posted to the Facebook newsroom, Guy Rosen, VP of Product Management, said:

“We now know that fewer people were impacted than we originally thought. Of the 50 million people whose access tokens we believed were affected, about 30 million actually had their tokens stolen.”

Rosen proceeds to explain how the breach happened, though most people reading right now are probably more interested to know if they themselves have been hacked. Those eager to learn more about the breach can visit Rosen’s post and read it through. For those of you who are here to check whether you’ve been hacked – and what the hackers have on you – continue reading below.

How to check if your Facebook profile was hacked

  1. First, you need to log into Facebook on the same platform you’re about to use to perform the check. It doesn’t matter which platform you’re on (desktop, mobile, iOS, Android, etc.), as long as you’re logged into Facebook.
  2. Second, you can confirm if your account was compromised by visiting this page that Facebook set up for the purpose.
  3. The page contains some updates on the ongoing investigation, as well as a custom message for every logged-in visitor that lands on that page. Scroll to the bottom and look for one of these three messages (different ones could appear as well):
Not hacked
Hacked but likely safe
So hacked!

What data did the hackers access?

  1. If you’re in the first boat, you are safe – your credentials and profile data have not been compromised.
  2. If you find yourself in the second boat, hackers have likely compromised your account, but your data should still be safe.
  3. If, however, you’re yourself in the third boat, things are not so rosy. As the third screenshot shows, Facebook displays quite an unnerving message for those users whose profile data has, in fact, been compromised.

Facebook claims that, for half of the compromised accounts (15 million people), attackers accessed these two sets of information:

  • name
  • contact details (phone number, email, or both, depending on what people had on their profiles)

Another 14 million people have had the same sets of information stolen, plus the following:

  • user name
  • gender
  • locale/language
  • relationship status
  • religion
  • hometown
  • self-reported current city
  • birth date
  • device types used to access Facebook
  • education
  • work
  • the last 10 places they checked into or were tagged in
  • website
  • people or Pages they follow
  • the 15 most recent searches

Only 1 million people – of the 30 million hacked – had no information stolen or otherwise compromised, the investigation revealed.

There’s some good news too, if we can call it that. Messages sent and received using the popular Facebook Messenger were not compromised during this attack. According to the company, the same should apply to Messenger Kids, Instagram, WhatsApp, Oculus, Workplace, Pages, payments, third-party apps, and advertising or developer accounts.

However, there is one exception:

  • If a person was a Page admin whose Page had received a message from someone on Facebook, the content of that message was available to the attackers

“In the coming days, we’ll send customized messages to the 30 million people affected to explain what information the attackers might have accessed, as well as steps they can take to help protect themselves, including from suspicious emails, text messages, or calls,” Facebook promised Friday.

As noted above, those messages are starting to go out but not everyone has received them yet.

How to proceed next

Now that you are armed with this information, proceed with your fingers crossed to Facebook’s security checker. If you’ve read through this whole post, here’s the URL again to save you some scroll time.

Facebook says that, even if your data was compromised, changing your password won’t improve the situation. That’s correct. The attacker(s) stole not passwords but access tokens, which they could use to take over people’s accounts without needing their actual credentials.

If, for one reason or another, you have trouble accessing your account, Facebook offers this handy knowledge base article as a quick remedy.

And lastly, some additional info that might help those worried about their data falling into the wrong hands:

  • Facebook has been alarmingly clumsy handling user data in the past year, leading many to abandon the platform
  • Bad actors have developed quite an affinity for breaching data custodians (i.e corporations that sit on vast pools of customer information) to support fraud and extortion
  • Never use a social network or unencrypted messaging client to write or share something that you would not want leaked in a breach, even years later
  • Use end-to-end encryption and two-factor authentication on every platform that offers it

*** This is a Security Bloggers Network syndicated blog from HOTforSecurity authored by Filip Truta. Read the original post at: https://hotforsecurity.bitdefender.com/blog/how-to-check-if-your-facebook-account-was-hacked-and-what-the-hackers-have-on-you-20450.html

October 15, 2018October 15, 2018 Filip Truta account takeover, Account Theft, Breach, Data breach, facebook, Industry News, personal data, Social networks
  • ← Fake Adobe update really *does* update Flash (while also installing cryptominer)
  • Cynerio Welcomes Dr John Halamka as Advisor →

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Most Read on the Boulevard

Digital Value Chain Attacks on the Rise
Uvalde Shooting Investigation Reveals Major Privacy Violation
Machine Learning Tackles Ransomware Attacks
TechStrong Con: Diversity Key to Solving Cybersecurity Talent Shortage
The Million-Dollar Question: To Pay or Not to Pay Ransom?
Capital One Data Breach Update: Former Amazon Engineer Convicted
How to get started with OT security
WordPress Security
Four Key Findings from the 2022 Cyberthreat Defense Report
Why Paper Receipts are Money at the Drive-Thru

Upcoming Webinars

Mon 27

AI and ML in Security

June 27 @ 1:00 pm - 2:00 pm
Thu 30

Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines

June 30 @ 11:00 am - 12:00 pm
Jul 19

Finding the Ransomware Threat INSIDE Your Backups

July 19 @ 3:00 pm - 4:00 pm
Jul 25

Applying the 2022 Open Source Findings to Software Supply Chain Risk Management

July 25 @ 3:00 pm - 4:00 pm
Jul 27

How to Shift Security Left: Best Practices From a Fortune 500 DevSecOps Leader

July 27 @ 1:00 pm - 2:00 pm
Aug 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

June 17, 2022 Richi Jennings | Jun 17 0
Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Cybersecurity Governance, Risk & Compliance Industry Spotlight IoT & ICS Security Security Awareness Security Boulevard (Original) Threat Intelligence 

Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity

May 23, 2022 Mike Hodge | May 23 Comments Off on Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Establishing a Root of Trust in Embedded Linux and IoT
Cybersecurity Endpoint Industry Spotlight IoT & ICS Security Security Boulevard (Original) Vulnerabilities 

Establishing a Root of Trust in Embedded Linux and IoT

April 18, 2022 Anita Buehrle | Apr 18 Comments Off on Establishing a Root of Trust in Embedded Linux and IoT

Top Stories

NSA Wants To Help you Lock Down MS Windows in PowerShell
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Incident Response Malware Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

NSA Wants To Help you Lock Down MS Windows in PowerShell

June 24, 2022 Richi Jennings | Yesterday 0
Hacker Paige Thompson Could Face 45 Years in Prison — ‘Suicide by Law Enforcement’
Analytics & Intelligence Application Security Blockchain Cloud Security Cyberlaw Cybersecurity Data Security DevOps Digital Currency Editorial Calendar Featured Governance, Risk & Compliance Identity & Access Identity and Access Management Incident Response Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Hacker Paige Thompson Could Face 45 Years in Prison — ‘Suicide by Law Enforcement’

June 21, 2022 Richi Jennings | 3 days ago 0
TechStrong Con: Diversity Key to Solving Cybersecurity Talent Shortage
Careers Cybersecurity Featured News Security Boulevard (Original) Spotlight 

TechStrong Con: Diversity Key to Solving Cybersecurity Talent Shortage

June 21, 2022 Michael Vizard | 3 days ago 0

Security Humor

Joy Of Tech® '#2909'

Joy Of Tech® ‘#2909’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.