Hackers can delete Facebook friends, thanks to flaw
IDG News Service - A bug in Facebook's Web site lets hackers delete Facebook friends without permission.
The flaw was reported Wednesday by Steven Abbagnaro, a student at Marist College in Poughkeepsie, New York. But as of Friday morning, Pacific time, it had still not been patched, based on tests conducted by the IDG News Service on a reporter's Facebook friends list.
A malicious hacker could combine an exploit for this bug with spam or even a self-copying worm code to wreak havoc on the social network, Abbagnaro said in an interview.
He's written proof-of-concept code that scrapes publicly available data from users' Facebook pages and then, one by one, deletes all of their friends. For the attack to work, however, the victim would first have to be tricked into clicking on a malicious link while logged into Facebook. "The next thing you know, you have no friends," Abbagnaro said.
The security researcher is not going to release the code used in his attack until after Facebook fixes the flaw, but he says that technically competent hackers could figure out how to pull off the attack.
That's because Abbagnaro's code exploits the same underlying flaw that was first reported by M.J. Keith, a senior security analyst with Alert Logic.
Called a cross-site request forgery bug, the flaw is a common Web programming error, but Facebook has had a hard time eradicating it from the site. After Keith first reported the issue, Facebook thought it had fixed the problem, only to discover that it could still be exploited to make users "like" Facebook pages without their consent.
Similarly, Facebook appears to have missed Abbagnaro's delete-friend vector as well.
"I am just blown away that this keeps happening," Keith said in an e-mail interview.
Facebook representatives couldn't immediately be reached for comment.
Facebook's security team has been under siege lately, with worm attacks and site flaws popping up on a regular basis. These security issues come as the social network has been hit with intense criticism for not adequately protecting users' privacy, and inappropriately sharing user data with advertisers.
Despite all of its other problems, Facebook should have fixed this latest flaw by now, Abbagnaro said. "I'm not sure why they haven't fixed it yet because it is pretty serious."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts