recommended reading

Facebook Failed to Notify Federal Social Media Community about Data Leak

Flickr user laughingsquid

The majority of agencies, as of late Sunday, had not been alerted by Facebook to a newly-discovered security risk on the social network used governmentwide, federal officials told Nextgov

A database error accidentally exposed email addresses and phone numbers of 6 million users to other Facebook users, the company disclosed late Friday in an online message. Essentially, members who downloaded their Facebook page histories were able to see confidential phone numbers and email addresses of other account-holders.

Thousands of federal Web managers and social media specialists are on Facebook to expand agency public outreach, government officials said on Sunday. The social titan did not respond to multiple inquiries to ascertain how many federal employees maintaining agency Facebook pages might have had their personal data compromised. 

Friday's online message stated, “When people upload their contact lists or address books to Facebook, we try to match that data with the contact information of other people on Facebook in order to generate friend recommendations." 

The company had been storing suggested friends' details in users' histories.  “As a result, if a person went to download an archive of their Facebook account through our Download Your Information (DYI) tool, they may have been provided with additional email addresses or telephone numbers for their contacts or people with whom they have some connection," company officials stated.

The flaw, which the social network learned about earlier this month, had existed since last year, according to news reports.

Aside from being angered about the exposure of private information, some users are outraged that Facebook has been harvesting this data in the first place, security analysts observed. The affected users had not registered their phone numbers and email addresses with Facebook. The company had been obtaining those details from friends' address books. 

"What the revelation means is that Facebook has much more information on us than we know, it may not be accurate, and despite everyone's best efforts to keep Facebook from knowing our phone numbers or work email address, the social network is getting our not-for-sharing numbers and email addresses anyway by stealing them (albeit through 'legitimate' means) from our friends," tech pundit Violet Blue wrote in a ZDNet column.

She added that the incident “creates a scenario of horrifying possibilities for any woman who has [begun] to experience harassment, abuse or stalking by an ex within the past year," or "anyone being maliciously stalked and harassed" by someone "they may have accidentally friended over the past year."

According to the company, an unaffiliated security researcher discovered the bug and informed Facebook through a so-called bug bounty program that offers at least $500 -- there is no payment cap: "each bug is awarded a bounty based on its severity and creativity.” Google, Mozilla and most-recently Microsoft have begun paying hackers, researchers and other good Samaritans to report previously-undetected vulnerabilities on Web services.  

On Friday, Facebook officials stated they "immediately disabled" the history download feature, fixed the issue, and restored the tool within one day of hearing about the defect. No other personal or financial data was involved, and developers as well as advertisers did not have access to the tool, they added. Company officials stated they "currently have no evidence" anyone took advantage of the mistake for malicious purposes. Nor have officials seen anomalous behavior on the site to suggest wrongdoing. 

Facebook officials downplayed the privacy lapse, but admitted they regret the episode: "Although the practical impact of this bug is likely to be minimal since any email address or phone number that was shared was shared with people who already had some of that contact information anyway, or who had some connection to one another, it's still something we're upset and embarrassed by, and we'll work doubly hard to make sure nothing like this happens again.” 

(Image via Flickr user laughingsquid)

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.