What you need to do about the recent Facebook security breach:
What you don’t need to do about the recent Facebook security breach:
- Don’t rush to change your password. Passwords were not affected during the breach, so they’re as safe as you’ve made them.
- Don’t panic. Even if you find yourself logged out of Facebook for some reason, Facebook says there’s no need to worry; it will have already reset the authentication token for you so that nobody but you can gain access to your account. You’ll need to log in again by entering your password and 2FA code (if you have enabled it), but that’s all.
- Don’t delete your Facebook account. Well, of course you can always do that, but this breach is not a reason to be quite that worried.
Here’s what actually happened
On September 28, Facebook published a security update explaining that the company’s engineering team has discovered a security issue affecting almost 50 million accounts. The bottom line is that somebody performed a rather sophisticated attack that allowed them to steal 50 million user access tokens.
An access token is, as Facebook describes it, basically a key to your account. If a person has it, Facebook considers that person authorized to enter that account and doesn’t request login, password, and 2FA codes. So, having stolen 50,000,000 user access tokens, the malefactors could potentially access those 50,000,000 accounts. But that doesn’t mean they got access to your passwords or somehow broke the two-factor authentication mechanism. Your password is secure and 2FA is still working as intended. But stealing a token is a way to bypass those defenses.
Facebook explains that investigation of the incident is in the very early stages, but for now they suspect that somebody found a vulnerability in their “View as” feature and exploited it, gaining access to 50 million account tokens. That’s why they have turned the feature off, reset the user authentication tokens for those accounts, and are in the process of resetting those tokens for another 40 million users who have used this feature in the past year. The last part seems like just a precaution, but at the moment, they can hardly be too careful.
When the token is reset, the person who has it can no longer access the account and will need to log in again. The malefactors don’t have your login or password, so even if you were affected initially, they can no longer pretend to be you and access the account.
Facebook promises to update the post once it’s clear what exactly happened and whether any of the affected accounts were somehow misused, but for now we suggest doing what we described in the beginning of the post: nothing. There’s nothing you can do at the moment, so don’t panic. When the situation clears up some more, if users can take any useful actions, we’ll let you know.