Facebook targeted by hackers, says no user data compromised
The attack exploited a zero-day vulnerability in Java that Oracle has since patched
IDG News Service - Facebook said Friday it had been the target of a sophisticated hacking attack but that it had no evidence any user data had been compromised.
The attack comes two weeks after Twitter asked 250,000 of its users to reset their passwords after it too was hacked. In the same week, The New York Times and The Wall Street Journal also reported being hacked.
Facebook said its systems were targeted last month when a handful of employees visited a mobile developer website that had been compromised. The website allowed malicious code to be installed on the employees' laptops, Facebook said in a blog post. It said the laptops were fully patched and running up-to-date antivirus software.
"As soon as we discovered the presence of the malware, we remediated all infected machines, informed law enforcement, and began a significant investigation that continues to this day," Facebook said.
The company said it had no evidence that any user data was compromised. It did not say where it thinks the attack originated or who may have conducted it, and a spokesman reached via email said the company had no further comment at this time.
The attack was identified when Facebook's security team spotted a suspicious domain in the company's corporate DNS logs and tracked it back to an employee laptop. After a malicious file was found on that laptop, the search was expanded companywide and several other compromised employee laptops were flagged, Facebook said.
"After analyzing the compromised website where the attack originated, we found it was using a 'zero-day' (previously unseen) exploit to bypass the Java sandbox (built-in protections) to install the malware," Facebook said.
It said it immediately reported the exploit to Oracle, which provided a patch on Feb. 1 to address the vulnerability.
The attack was not limited to Facebook. "It is clear that others were attacked and infiltrated recently as well," it said. As one of the first companies targeted by the malware, it said it "immediately took steps to start sharing details about the infiltration with the other companies and entities that were affected."
Oracle's Java technology has come under fire recently over security. It patched some critical vulnerabilities in the platform in mid-January, but still the U.S. Computer Emergency Readiness Team (US-CERT) urged users to disable browser plug-ins that use Java.
Oracle released another patch at the start of February, but did not mention at the time that the vulnerability had been used to target Facebook. Last week it said it would release yet more patches on Feb. 19.
- Facebook launches redesign with a bit of the old, a bit of the new
- Facebook eyes solar-powered drone company
- Facebook coughs up $19B for WhatsApp's younger users
- Facebook buying WhatsApp for $16 billion
- Facebook's birthday present: A look back at your social life
- At 10, Facebook strives not to be your granny's social network
- Facebook sees apps in its future ... lots of apps
- Facebook hijacks Trending feature from rival Twitter
- Facebook to kill off one kind of ad some users hated
- Facebook uses a seasoned Chef to keep servers simmering
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Mobile Applications Case Study: 8 Billion Transactions a Day The story documents how the online brokerage company tradeMONSTER created a custom mobile app and the success gleaned from this initiative. Also covered...
- Who's afraid of the big (data) bad wolf? Survive the big data storm by getting ahead of integration and governance functional requirements This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Cybercrime and Hacking White Papers | Webcasts