{"id":14894,"date":"2019-03-21T10:45:35","date_gmt":"2019-03-21T18:45:35","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/03\/21\/news-8643\/"},"modified":"2019-03-21T10:45:35","modified_gmt":"2019-03-21T18:45:35","slug":"news-8643","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/03\/21\/news-8643\/","title":{"rendered":"Facebook Stored Millions of Passwords in Plaintext\u2014Change Yours Now"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c93bd4aa076347b3fe6d5b8\/master\/pass\/Security-Facebook-Passwords-559572429.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 21 Mar 2019 18:16:17 +0000<\/strong><\/p>\n<p><span class=\"lede\">At this point, <\/span>it\u2019s difficult to summarize all of <a href=\"https:\/\/www.wired.com\/story\/facebook-privacy-apps-ads-friends-delete-account\/\">Facebook\u2019s privacy<\/a>, <a href=\"https:\/\/www.wired.com\/story\/wired-facebook-cambridge-analytica-coverage\/\">misuse<\/a>, and <a href=\"https:\/\/www.wired.com\/story\/how-facebook-hackers-compromised-30-million-accounts\/\">security missteps<\/a> in one neat description. And it just got even harder. On Thursday, following a <a href=\"https:\/\/krebsonsecurity.com\/2019\/03\/facebook-stored-hundreds-of-millions-of-user-passwords-in-plain-text-for-years\/\" target=\"_blank\">report by Krebs on Security<\/a>, Facebook acknowledged a bug in its password management systems that caused hundreds of millions of user <a href=\"https:\/\/www.wired.com\/story\/7-steps-to-password-perfection\/\">passwords<\/a> for Facebook, <a href=\"https:\/\/www.wired.com\/story\/facebook-lite-app\/\">Facebook Lite<\/a>, and Instagram to be stored as plaintext in an internal platform. This means that thousands of Facebook employees could have searched for and found them. Krebs reports that the passwords stretched back to those created in 2012.<\/p>\n<p>Organizations can store account passwords securely by scrambling them with a <a href=\"https:\/\/www.wired.com\/2016\/06\/hacker-lexicon-password-hashing\/\">cryptographic process known as hashing<\/a> before saving them to their servers. This way, even if someone compromises those passwords, they won&#x27;t be able to read them, and a computer would find it difficult\u2014even functionally impossible\u2014to unscramble them. As a prominent company with billions of users, Facebook knows that <a href=\"https:\/\/www.wired.com\/story\/facebook-hack-data-spammers\/\">it would be a jackpot for hackers<\/a>, and invests heavily to avoid the liability and embarrassment of security mishaps. Unfortunately, though, one open window negates all the padlocks, bolts, and booby traps money can buy.<\/p>\n<p class=\"paywall\">\u201cAs part of a routine security review in January, we found that some user passwords were being stored in a readable format within our internal data storage systems,\u201d Pedro Canahuati, Facebook\u2019s vice president of engineering, security, and privacy wrote in a <a href=\"https:\/\/newsroom.fb.com\/news\/2019\/03\/keeping-passwords-secure\/\" target=\"_blank\">statement<\/a>. \u201cOur login systems are designed to mask passwords using techniques that make them unreadable. To be clear, these passwords were never visible to anyone outside of Facebook and we have found no evidence to date that anyone internally abused or improperly accessed them.\u201d<\/p>\n<p class=\"paywall\">Canahuati says that Facebook has now corrected the password logging bug, and that the company will notify hundreds of millions of Facebook Lite users, tens of millions of Facebook users, and tens of thousands of Instagram users that their passwords may have been exposed. Facebook does not plan to reset those users\u2019 passwords.<\/p>\n<p>&quot;In some ways that\u2019s the most sensitive data they hold, because it\u2019s raw and unmanaged.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Kenn White, Open Crypto Audit Project<\/p>\n<p class=\"paywall\">For such a prominent target, Facebook has had relatively few technical security failures, and in this case appears not to have been compromised. But the company\u2019s track record was severely marred by a <a href=\"https:\/\/www.wired.com\/story\/facebook-security-breach-50-million-accounts\/\">breach in September<\/a> in which attackers stole extensive data from 30 million users by compromising their account access tokens\u2014authentication markers generated when a user logs in.<\/p>\n<p class=\"paywall\">That breach indirectly helped Facebook discover the trove of plaintext passwords and the bugs that caused them to be there; the incident motivated a security review that caught the lapse. \u201cIn the course of our review, we have been looking at the ways we store certain other categories of information\u2014like access tokens\u2014and have fixed problems as we\u2019ve discovered them,\u201d Canahuati wrote.<\/p>\n<p class=\"paywall\">&quot;It\u2019s good that they\u2019re being proactive,&quot; says Lukasz Olejnik, an independent cybersecurity adviser and research associate at the Center for Technology and Global Affairs at Oxford University. &quot;But this is a big deal. It seems like they found the issue during an audit so maybe their past mistakes plus new privacy regulations are making these checks more standard.&quot;<\/p>\n<p class=\"paywall\">Facebook told WIRED that the exposed passwords weren\u2019t all stored in one place, and that the issue didn\u2019t result from a single bug in the platform\u2019s password management system. Instead, the company had unintentionally and incidentally captured plaintext passwords across a variety of internal mechanisms and storage systems, like crash logs. Facebook says that the scattered nature of the problem made it more complicated both to understand and to fix, which the company says explains the nearly two months it took to complete the investigation and disclose the findings.<\/p>\n<p class=\"paywall\">A company operating at Facebook&#x27;s enormous scale needs to keep network traffic logs to better understand and trace bugs, outages, and other incidents that may crop up. Those logs will inevitably pull in whatever network data happens to be flowing by. That Facebook caught passwords in that process makes sense; the question is why Facebook retained logs that included sensitive data for so long, and why the company was apparently unaware of its contents.<\/p>\n<p class=\"paywall\">\u201cThe data that\u2019s captured incidentally as part of debugging and operating at the network scales they do is not uncommon,\u201d says Kenn White, a security engineer and director of the Open Crypto Audit Project. \u201cBut if Facebook retains that for years it raises a lot of questions about their architecture. They have an obligation to protect these debug logs and audit and understand what they\u2019re retaining. In some ways that\u2019s the most sensitive data they hold, because it\u2019s raw and unmanaged.\u201d<\/p>\n<p class=\"paywall\">Twitter dealt with a <a href=\"https:\/\/www.wired.com\/story\/change-your-twitter-password-right-now\/\">very similar<\/a> plaintext password-logging bug last May; it, too, didn&#x27;t require users to reset their passwords, saying it had no reason to believe that the passwords were actually breached. Similarly, Facebook says its investigation hasn\u2019t revealed any signs that anyone intentionally accessed its hundreds of millions of errant passwords to steal them. But whether you get a password notification from Facebook or not, you might as well go ahead and change it just in case.<\/p>\n<p class=\"paywall\">To do so on Facebook desktop, go to <strong>Settings \u2192 Security and Login \u2192 Change Password<\/strong>. On Facebook for iOS and Android, go to <strong>Settings &amp; Privacy \u2192 Settings \u2192 Security and Login \u2192 Change Password<\/strong>. On Facebook Lite for Android, go to <strong>Settings \u2192 Security and Login \u2192 Change Password<\/strong>. Changing your account password on either main Facebook or Facebook Lite changes it for both.<\/p>\n<p class=\"paywall\">On Instagram, go to <strong>Settings \u2192 Privacy and Security \u2192 Password<\/strong> to change your password. Instagram and Facebook do not use the same password, but can be linked to log into one with the other.<\/p>\n<p class=\"paywall\">And while you&#x27;re at it, the easiest way to keep track of and manage your passwords so you can easily change them after incidents like this is to set up a password manager. <a href=\"https:\/\/www.wired.com\/story\/password-manager-autofill-ad-tech-privacy\/\">Go get one now<\/a>.<\/p>\n<p class=\"paywall\">Facebook says that the plaintext password issue is now fixed, and that it doesn\u2019t think there will be long term impacts from the incident, because the passwords were never actually stolen. But given the company\u2019s apparently endless stream of gaffes, it\u2019s difficult to know what will come next.<\/p>\n<p class=\"paywall\">\u201cI get that they are working at mind-boggling scale,\u201d White says. \u201cBut these are the crown jewels right there.\u201d<\/p>\n<p class=\"related-cne-video-component__dek\">Look, we get it. Remembering dozens and dozens of different passwords for different sites is next to impossible. But that doesn\u2019t mean you should be reusing your passwords. That\u2019s just asking for trouble.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/facebook-passwords-plaintext-change-yours\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c93bd4aa076347b3fe6d5b8\/master\/pass\/Security-Facebook-Passwords-559572429.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 21 Mar 2019 18:16:17 +0000<\/strong><\/p>\n<p>Facebook has disclosed that it stored hundreds of millions of user passwords in plaintext, where employees could search them.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-14894","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14894"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14894\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14894"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}