Security researchers at Trustlook claim that nearly 26,000 malicious apps used Facebook APIs to collect Facebook...
user data. What type of APIs did these apps use, and is there anything Facebook can do to prevent bad actors from using them to harvest data?
Data scientist Aleksandr Kogan developed an app, thisisyourdigitallife, which enabled Cambridge Analytica to collect the personal details of 80 million Facebook users. Although the app was only downloaded 270,000 times, it collected Facebook user data from users and their Facebook friends.
When someone uses Facebook Login to connect with apps and services, they grant those apps access to a range of information from their Facebook profile. In 2015, Facebook also allowed apps to access some information from the friend networks of people who used Facebook Login, even though those friends may not have agreed to share their data.
Although Kogan gained access to this vast data set in a legitimate way and through the proper channels that governed developers on Facebook at that time, he shared it with Cambridge Analytica, violating Facebook's policies. Plus, the app was presented as a personality quiz, but the data collected was used for political marketing.
According to research by Trustlook, Cambridge Analytica is probably not the only company that has taken advantage of -- or abused -- Facebook's data policies to gather Facebook user data. Using its Secureai App Insights technology, Trustlook identified almost 26,000 apps it classifies as malicious that use at least one of Facebook's APIs, such as the login or messaging APIs.
Secureai assigns a risk score based on 80 data points it collects on the apps it scans, including permissions, libraries, risky API calls and network activity. Although these apps may not be harvesting personal data on the scale of Cambridge Analytica, the fact that they are deemed malicious means they may be abusing the permissions associated with certain Facebook APIs and misusing the personal data they provide access to.
Facebook was naïve to assume all app developers would use Facebook user data according to their policies and terms of service, and Facebook's CEO Mark Zuckerberg acknowledged making a mistake in trusting app developers. He has promised that Facebook will audit thousands of apps and give users easier tools to manage how their data is used and shared. But requiring developers to sign a contract before they are allowed to ask Facebook users for access to their posts is unlikely to deter bad actors.
However, preventing bad actors from using Facebook and other social networks to harvest personal data requires these platforms to offer far better visibility into how user information is handled by third-party apps. This means constant monitoring and scanning to detect behavior that is incompatible with usage policies. Surely border gateways and internal checks should be able to detect when an app used by 270,000 people retrieves personal data from 80 million users.
Ask the expert:
Want to ask Michael Cobb a question about application security? Submit your questions now via email. (All questions are anonymous.)
Dig Deeper on Data security breaches
Related Q&A from Michael Cobb
WhatsApp vulnerabilities can enable hackers to bypass end-to-end encryption and spoof messages. Expert Michael Cobb explains how these attacks work ... Continue Reading
Disabling Google location tracking involves more than turning off Location History. Learn how to manage your account settings to stop tracking ... Continue Reading
Compared to TLS 1.2, TLS 1.3 saw improvements in security, performance and privacy. Learn how TLS 1.3 eliminated vulnerabilities using cryptographic ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.