Sunday, December 6, 2020
  • Phishing Attacks on Your Brand are Unrelenting, AI is the Only Way to Fight Back
  • Germany’s Anti-Semitic Phonetic Alphabet
  • DEF CON 28 Safe Mode Aerospace Village – Allan Tart’s & Fabian Landis’ ‘Low Cost VHF Receiver’
  • XKCD ‘Contiguous 41 States’
  • DEF CON 28 Safe Mode Aerospace Village – Matt Gaffney’s ‘MITM: The Mystery In The Middle’

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Data Security SBN News Security Bloggers Network Threats & Breaches 

Home » Cybersecurity » Data Security » How to check if your Facebook account was hacked and what the hackers have on you

How to check if your Facebook account was hacked and what the hackers have on you

by Filip Truta on October 15, 2018

Following a massive breach that compromised tens of millions of accounts, Facebook has started sending out custom messages to inform people if or how they were impacted. Users who have yet to receive a custom notification from the social network can manually check whether their account got hacked, and what data might have been leaked. Here’s how.

First, some background. As many of you probably read in the news last week, between September 14 and September 27 an unknown attacker used daisy-chained vulnerabilities in the platform’s View As feature to snatch authentication tokens of tens of millions of users.

The initial count was 50 million to 90 million compromised accounts. After further investigation, Facebook said only 30 million accounts were in fact compromised.

In an update posted to the Facebook newsroom, Guy Rosen, VP of Product Management, said:

“We now know that fewer people were impacted than we originally thought. Of the 50 million people whose access tokens we believed were affected, about 30 million actually had their tokens stolen.”

Rosen proceeds to explain how the breach happened, though most people reading right now are probably more interested to know if they themselves have been hacked. Those eager to learn more about the breach can visit Rosen’s post and read it through. For those of you who are here to check whether you’ve been hacked – and what the hackers have on you – continue reading below.

How to check if your Facebook profile was hacked

  1. First, you need to log into Facebook on the same platform you’re about to use to perform the check. It doesn’t matter which platform you’re on (desktop, mobile, iOS, Android, etc.), as long as you’re logged into Facebook.
  2. Second, you can confirm if your account was compromised by visiting this page that Facebook set up for the purpose.
  3. The page contains some updates on the ongoing investigation, as well as a custom message for every logged-in visitor that lands on that page. Scroll to the bottom and look for one of these three messages (different ones could appear as well):
Not hacked
Hacked but likely safe
So hacked!

What data did the hackers access?

  1. If you’re in the first boat, you are safe – your credentials and profile data have not been compromised.
  2. If you find yourself in the second boat, hackers have likely compromised your account, but your data should still be safe.
  3. If, however, you’re yourself in the third boat, things are not so rosy. As the third screenshot shows, Facebook displays quite an unnerving message for those users whose profile data has, in fact, been compromised.

Facebook claims that, for half of the compromised accounts (15 million people), attackers accessed these two sets of information:

  • name
  • contact details (phone number, email, or both, depending on what people had on their profiles)

Another 14 million people have had the same sets of information stolen, plus the following:

  • user name
  • gender
  • locale/language
  • relationship status
  • religion
  • hometown
  • self-reported current city
  • birth date
  • device types used to access Facebook
  • education
  • work
  • the last 10 places they checked into or were tagged in
  • website
  • people or Pages they follow
  • the 15 most recent searches

Only 1 million people – of the 30 million hacked – had no information stolen or otherwise compromised, the investigation revealed.

There’s some good news too, if we can call it that. Messages sent and received using the popular Facebook Messenger were not compromised during this attack. According to the company, the same should apply to Messenger Kids, Instagram, WhatsApp, Oculus, Workplace, Pages, payments, third-party apps, and advertising or developer accounts.

However, there is one exception:

  • If a person was a Page admin whose Page had received a message from someone on Facebook, the content of that message was available to the attackers

“In the coming days, we’ll send customized messages to the 30 million people affected to explain what information the attackers might have accessed, as well as steps they can take to help protect themselves, including from suspicious emails, text messages, or calls,” Facebook promised Friday.

As noted above, those messages are starting to go out but not everyone has received them yet.

How to proceed next

Now that you are armed with this information, proceed with your fingers crossed to Facebook’s security checker. If you’ve read through this whole post, here’s the URL again to save you some scroll time.

Facebook says that, even if your data was compromised, changing your password won’t improve the situation. That’s correct. The attacker(s) stole not passwords but access tokens, which they could use to take over people’s accounts without needing their actual credentials.

If, for one reason or another, you have trouble accessing your account, Facebook offers this handy knowledge base article as a quick remedy.

And lastly, some additional info that might help those worried about their data falling into the wrong hands:

  • Facebook has been alarmingly clumsy handling user data in the past year, leading many to abandon the platform
  • Bad actors have developed quite an affinity for breaching data custodians (i.e corporations that sit on vast pools of customer information) to support fraud and extortion
  • Never use a social network or unencrypted messaging client to write or share something that you would not want leaked in a breach, even years later
  • Use end-to-end encryption and two-factor authentication on every platform that offers it

*** This is a Security Bloggers Network syndicated blog from HOTforSecurity authored by Filip Truta. Read the original post at: https://hotforsecurity.bitdefender.com/blog/how-to-check-if-your-facebook-account-was-hacked-and-what-the-hackers-have-on-you-20450.html

October 15, 2018October 15, 2018 Filip Truta account takeover, Account Theft, Breach, Data breach, facebook, Industry News, personal data, Social networks
  • ← Fake Adobe update really *does* update Flash (while also installing cryptominer)
  • Cynerio Welcomes Dr John Halamka as Advisor →

TechStrong TV – Live

Watch latest episodes and shows
Featured Blog

Eric Kedrosky

The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Michael Clark

Prevent Catastrophic Data Loss in the Cloud

Rich Gardner

CISO Roundtable: What We’ve Heard, and What We’re Looking Forward To

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

Brazil Govt’s Huge Leak: Health Data of 243M
Securing the Office of the Future
California Federal Court Weighs In (Again) on Social Media Scraping
Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy
U.S. Election Security (and Insecurities)
Drupal Core: Behind the Vulnerability
VMware Horizon Architecture: Planning Your Deployment
There’s a RAT in my code: new npm malware with Bladabindi trojan spotted
A Modern Exploration of Windows Memory Corruption Exploits – Part I: Stack Overflows
“Free” Symchanger Malware Tricks Users Into Installing Backdoor

Upcoming Webinars

Mon 07

The Battle for Container Security

December 7 @ 1:00 pm - 2:00 pm
Tue 08

XDR (Extended Detection and Response): The Next Generation of Protection

December 8 @ 11:00 am - 12:00 pm
Thu 10

Data Security for Contact Centers Leveraging Cloud Technologies

December 10 @ 3:00 pm - 4:00 pm
Mon 14

Issues and Answers in Cloud Security

December 14 @ 1:00 pm - 2:00 pm
Tue 15

3 Things to Get Right for Successful DevSecOps

December 15 @ 3:00 pm - 4:00 pm
Wed 16

Unsolved Problems in Open Source Security

December 16 @ 11:00 am - 12:00 pm
Wed 16

Securing Medical Apps in the Age of COVID-19: How to Close Security Gaps and Meet Accelerated Demand

December 16 @ 1:00 pm - 2:00 pm
Wed 16

Deliver your App Anywhere … Publicly or Privately

December 16 @ 3:00 pm - 4:00 pm
Thu 17

Secure Your Peace of Mind and Your Mobile App While Giving Developers Back Their Happy Coding Time

December 17 @ 11:00 am - 12:00 pm
Thu 17

Solving Kubernetes Security Challenges Using Red Hat OpenShift and Sysdig

December 17 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

7 Must-Read eBooks for Security Professionals

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Why Hackers Love the Pandemic
Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

Why Hackers Love the Pandemic

December 4, 2020 Chris Hallenback | 2 days ago 0
Security and COVID-19: Securing the New Normal
Cybersecurity Data Security Industry Spotlight Network Security Security Boulevard (Original) 

Security and COVID-19: Securing the New Normal

December 3, 2020 DAVID CANELLOS | 3 days ago 0
Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy
Cybersecurity Industry Spotlight Security Boulevard (Original) Threats & Breaches 

Web App Security: Don’t Let the Code Injection Grinch Steal Holiday Joy

December 2, 2020 Ameet Naik | 4 days ago 0

Top Stories

Brazil Govt’s Huge Leak: Health Data of 243M
Application Security Cloud Security Cyberlaw Cybersecurity Data Security Featured News Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

Brazil Govt’s Huge Leak: Health Data of 243M

December 4, 2020 Richi Jennings | 1 day ago 0
Second Swiss Firm Said to Be CIA Encryption Puppet
Analytics & Intelligence Cyberlaw Cybersecurity Featured News Security Boulevard (Original) Spotlight Threat Intelligence 

Second Swiss Firm Said to Be CIA Encryption Puppet

November 30, 2020 Richi Jennings | Nov 30 0
Unisys Adds Visualization Tools to Stealth Platform
Cybersecurity Featured Network Security News Security Boulevard (Original) Spotlight 

Unisys Adds Visualization Tools to Stealth Platform

November 30, 2020 Michael Vizard | Nov 30 0

Security Humor

via  the comic delivery system monikered  Randall Munroe  resident at   XKCD  !

XKCD ‘Contiguous 41 States’

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2020 MediaOps Inc. All rights reserved.

Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.