Facebook targeted by hackers, says no user data compromised
The attack exploited a zero-day vulnerability in Java that Oracle has since patched
IDG News Service - Facebook said Friday it had been the target of a sophisticated hacking attack but that it had no evidence any user data had been compromised.
The attack comes two weeks after Twitter asked 250,000 of its users to reset their passwords after it too was hacked. In the same week, The New York Times and The Wall Street Journal also reported being hacked.
Facebook said its systems were targeted last month when a handful of employees visited a mobile developer website that had been compromised. The website allowed malicious code to be installed on the employees' laptops, Facebook said in a blog post. It said the laptops were fully patched and running up-to-date antivirus software.
"As soon as we discovered the presence of the malware, we remediated all infected machines, informed law enforcement, and began a significant investigation that continues to this day," Facebook said.
The company said it had no evidence that any user data was compromised. It did not say where it thinks the attack originated or who may have conducted it, and a spokesman reached via email said the company had no further comment at this time.
The attack was identified when Facebook's security team spotted a suspicious domain in the company's corporate DNS logs and tracked it back to an employee laptop. After a malicious file was found on that laptop, the search was expanded companywide and several other compromised employee laptops were flagged, Facebook said.
"After analyzing the compromised website where the attack originated, we found it was using a 'zero-day' (previously unseen) exploit to bypass the Java sandbox (built-in protections) to install the malware," Facebook said.
It said it immediately reported the exploit to Oracle, which provided a patch on Feb. 1 to address the vulnerability.
The attack was not limited to Facebook. "It is clear that others were attacked and infiltrated recently as well," it said. As one of the first companies targeted by the malware, it said it "immediately took steps to start sharing details about the infiltration with the other companies and entities that were affected."
Oracle's Java technology has come under fire recently over security. It patched some critical vulnerabilities in the platform in mid-January, but still the U.S. Computer Emergency Readiness Team (US-CERT) urged users to disable browser plug-ins that use Java.
Oracle released another patch at the start of February, but did not mention at the time that the vulnerability had been used to target Facebook. Last week it said it would release yet more patches on Feb. 19.
- What to expect in Facebook's earnings call today
- Could you quit Facebook for 99 days?
- Facebook is a school yard bully that's going down
- EPIC says Facebook 'messed with people's minds,' seeks FTC sanctions
- 7 things you need to know about Facebook's mood experiment
- Facebook emotional manipulation test turns users into 'lab rats'
- Facebook tries to stop Snapchat drain with Slingshot
- TMI! Facebook moves to stop over-sharing
- Inside Facebook's brilliant plan to hog your data
- Facebook shows mobile app developers the money with new ad network
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts