Incident: Facebook Password Scam Exposes User Data: Cloud Database Breach

Published Date: 2020-11-13

Postmortem Analysis
Timeline 1. The software failure incident happened in November 2020 [108237].
System 1. Cloud database storing pilfered login credentials [108237]
Responsible Organization 1. The crime operation that tricked Facebook users into handing over their account passwords by posing as legitimate services and creating fake login pages [108237].
Impacted Organization 1. Facebook users [108237]
Software Causes 1. Lack of proper security measures in the cloud database storing the pilfered login credentials, allowing anyone with a web browser to view the information [108237]. 2. Scammers creating websites posing as legitimate services to trick Facebook users into entering their account passwords on fake login pages [108237]. 3. Exploiting the stolen access to post spam content about bitcoin-related services and news using victims' Facebook profiles [108237]. 4. Offering false claims about revealing who viewed a user's Facebook profile to lure users into clicking on links leading to a fake bitcoin trading platform [108237].
Non-software Causes 1. Lack of proper security measures in place to protect the cloud database storing the pilfered login credentials [108237]. 2. Deceptive websites posing as legitimate services to trick Facebook users into entering their account passwords [108237]. 3. Scammers posing as victims to post spam content and lure others into a bitcoin scheme [108237]. 4. Failure of users to verify the legitimacy of links and apps before entering login credentials [108237].
Impacts 1. Hundreds of thousands of Facebook users were tricked into handing over their account passwords to fraudsters due to a basic security mistake in a cloud database, leading to exposure of sensitive login credentials [108237]. 2. The scammers used the stolen passwords to post spam content on victims' Facebook profiles, potentially luring their friends into a bitcoin scheme [108237]. 3. The incident highlighted the importance of following legitimate links and downloading verified apps before logging into any service to avoid falling for similar tricks [108237]. 4. The exposed database contained millions of records estimated to pertain to hundreds of thousands of accounts, indicating a significant scale of potential impact on users [108237].
Preventions 1. Implementing multi-factor authentication (MFA) could have prevented the software failure incident by adding an extra layer of security beyond just passwords [108237]. 2. Conducting regular security audits and vulnerability assessments to identify and address potential weaknesses in the system could have helped prevent the incident [108237]. 3. Educating users about the dangers of clicking on suspicious links and providing awareness about common phishing tactics could have reduced the likelihood of users falling for such scams [108237].
Fixes 1. Implementing multi-factor authentication (MFA) for user accounts to add an extra layer of security beyond just passwords [108237]. 2. Conducting regular security audits and vulnerability assessments to identify and address potential weaknesses in the system [108237]. 3. Educating users about the importance of verifying links and downloading apps only from trusted sources to prevent falling for phishing scams [108237]. 4. Enforcing stricter security measures for cloud databases, such as ensuring they are properly secured with strong passwords and access controls [108237].
References 1. Israeli security researchers Noam Rotem and Ran Locar [108237] 2. Security website vpnMentor [108237] 3. Facebook [108237]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the exposure of a database containing sensitive information due to a basic security mistake has happened before within the same organization, Facebook. The incident involved fraudsters tricking Facebook users into handing over their account passwords through fake websites posing as legitimate services offering to show who viewed their profiles. This led to the exposure of a cloud database storing the stolen login credentials without proper security measures in place [108237]. (b) The software failure incident of exposing sensitive information due to an unprotected database has also occurred at other organizations. The security researchers, Noam Rotem and Ran Locar, who discovered this incident, typically find consumer data left exposed by legitimate businesses with poor security practices. They have found other instances of unprotected databases containing sensitive information, such as patient records from plastic surgery clinics, expected salaries of job seekers, and national ID numbers of moviegoers in Peru [108237].
Phase (Design/Operation) design, operation (a) The software failure incident in the article can be attributed to a design failure. The fraudsters tricked Facebook users into handing over their account passwords by creating websites posing as legitimate services offering to show who had viewed their Facebook profiles. This design flaw in the fake websites led to users entering their account passwords, which were then stolen by the scammers [108237]. (b) The software failure incident can also be linked to an operation failure. The scammers operated by using the stolen passwords to post spam content on victims' Facebook profiles, luring their friends into a bitcoin scheme. This operation failure involved the misuse of the stolen credentials to carry out fraudulent activities on the platform [108237].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident in the article was primarily due to a basic security mistake made by the fraudsters who tricked Facebook users into handing over their account passwords. The fraudsters forgot to lock down a cloud database storing the stolen login credentials with a password of their own, allowing anyone with a web browser to view the information [108237]. This failure originated from within the system as it was a result of a security oversight by the perpetrators. (b) outside_system: The incident involved the fraudsters using websites posing as legitimate services to trick Facebook users into entering their account passwords. These websites sent users to faked Facebook login pages, where victims unknowingly provided their credentials. This aspect of the incident involved external factors such as social engineering tactics used by the scammers to deceive users [108237].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case occurred due to non-human actions. The fraudsters tricked Facebook users into handing over their account passwords by creating websites posing as legitimate services offering to show who had viewed their Facebook profiles. The scammers then exposed their own operation by failing to secure a cloud database storing the stolen login credentials with a password, allowing anyone with a web browser to access the information [108237].
Dimension (Hardware/Software) software (a) The software failure incident in Article 108237 was not directly attributed to hardware issues. The incident primarily involved a security breach where fraudsters tricked Facebook users into handing over their account passwords by posing as legitimate services. The failure originated from the lack of proper security measures in place, such as failing to secure the cloud database storing the stolen login credentials with a password of their own. This oversight allowed anyone with a web browser to access the information, leading to the exposure of the scam operation [108237]. (b) The software failure incident in Article 108237 was primarily due to contributing factors originating in software. The fraudsters exploited vulnerabilities in the software by creating fake websites that mimicked legitimate services to trick users into entering their account passwords. This software manipulation allowed the scammers to collect the login credentials and use them to post spam content and lure victims into a bitcoin scheme. The incident highlighted the importance of verifying links and apps before logging into any service to prevent falling victim to such software-based scams [108237].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in Article 108237 was malicious in nature. The incident involved a crime operation that tricked hundreds of thousands of Facebook users into handing over their account passwords through fake websites and login pages. The fraudsters then exposed their own operation by making a basic security mistake of not securing the cloud database where they stored the stolen login credentials. This malicious act allowed anyone with a web browser to view the information and potentially use the stolen credentials for further fraudulent activities [108237].
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident was due to poor_decisions. The fraudsters behind the crime operation made a basic security mistake by forgetting to lock down a cloud database storing the stolen login credentials with a password of their own. This poor decision led to the exposure of the database, allowing anyone with a web browser to view the information [108237].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident in Article 108237 can be attributed to development incompetence. The fraudsters behind the crime operation made a basic security mistake by forgetting to lock down a cloud database storing the stolen login credentials with a password of their own. This lack of professional competence in securing the database led to the exposure of sensitive information, allowing anyone with a web browser to view the data [108237]. (b) Additionally, the incident can also be categorized as accidental as the exposure of the database with the pilfered login credentials was not intentional. It was a mistake made by the fraudsters, which inadvertently exposed their operation and led to the discovery of the security breach by Israeli security researchers [108237].
Duration temporary The software failure incident described in the article is more of a temporary nature. The incident occurred when fraudsters tricked Facebook users into handing over their account passwords by posing as legitimate services offering to show who had viewed their profiles. This led to the exposure of a cloud database storing the stolen login credentials without proper security measures in place. However, once the security researchers, Noam Rotem and Ran Locar, discovered the exposed database, they reported their findings to Facebook, which then took action by resetting the passwords for affected accounts. As a result, the database is no longer exposed, indicating a temporary failure that was resolved [108237].
Behaviour crash, omission, value, other (a) crash: The software failure incident in the article can be categorized as a crash. The fraudsters' operation was exposed because they forgot to secure a cloud database, allowing anyone with a web browser to view the information stored there. This led to the exposure of their operation and the theft of login credentials from hundreds of thousands of Facebook users [Article 108237]. (b) omission: The software failure incident can also be categorized as an omission. The scammers tricked users into handing over their account passwords by posing as legitimate services offering to show who had viewed their Facebook profiles. However, the promised information was not delivered, and instead, the scammers collected login credentials [Article 108237]. (c) timing: The software failure incident does not align with a timing failure. The incident was not about the system performing its intended functions too late or too early; rather, it was about the system failing to secure the database, leading to the exposure of sensitive information [Article 108237]. (d) value: The software failure incident can be categorized as a value failure. The scammers used stolen access to victims' Facebook accounts to post spam content related to bitcoin schemes, luring their friends into the scheme. This misuse of the stolen access demonstrates a failure in the system performing its intended functions incorrectly [Article 108237]. (e) byzantine: The software failure incident does not align with a byzantine failure. There were no mentions of inconsistent responses or interactions in the behavior of the system during this incident [Article 108237]. (f) other: The other behavior exhibited in this software failure incident is a security vulnerability. The failure of the fraudsters to secure the cloud database where they stored the stolen login credentials highlights a significant security flaw in their operation, leading to the exposure of sensitive information [Article 108237].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident described in the article resulted in the exposure of hundreds of thousands of Facebook users' account passwords due to a basic security mistake made by fraudsters. The fraudsters tricked users into handing over their login credentials through fake websites posing as legitimate services. As a consequence, the scammers were able to access and steal sensitive information, including login credentials, which they then used to post spam content and lure victims into a bitcoin scheme. Additionally, the exposed database contained millions of records estimated to pertain to hundreds of thousands of accounts, indicating a significant impact on users' data security and privacy [108237].
Domain information (a) The incident reported in Article 108237 is related to the information industry. The software failure involved a crime operation that tricked hundreds of thousands of Facebook users into handing over their account passwords by posing as legitimate services offering to show Facebook users who had viewed their profiles. This incident highlights the importance of cybersecurity and being cautious while interacting with online platforms [108237].

Sources

Back to List