309 million Facebook user phone numbers (and more) found online – Naked Security



[ad_1]

Over the weekend, researchers at cybersecurity intelligence firm Cyble found a database of 267 million Facebook user profiles that are sold on the Dark Web.

Seeking to verify the records and add them to the company’s default notification service, investigators bought it … for a total of £ 500.

That equates to $ 540, or about 0.0002 cents, per registration. The records contained the identifications of Facebook users, which are unique public numbers associated with specific accounts that can be used to determine an account’s username and other profile information. The records also included full names, email addresses, phone numbers, timestamps for the last connection, relationship status, and age.

Fortunately, the passwords were not exposed, but the breach still forms a perfect toolkit for an email or text phishing campaign that appears to be coming from Facebook. If enough users are fooled by clicking on the spearfishers’ manipulated links, it could lead to the exposure of even more valuable data.

How was the data filtered? In a blog post, Cyble said he doesn’t know, but his researchers suspect the logs could come from a leak in the Facebook developer’s API or from scraping: automatic sucking of publicly available data (like people friendly to I often post publicly on Facebook and other social media.)

Still appears

However, the story does not end there. In fact, it doesn’t start there either. It turns out that this same database had been previously published; seen by security researcher Bob Diachenko; removed by the ISP hosting the page; reappeared, fattened up with another 42 million records in an Elasticsearch cluster on a second server; And then it was destroyed by unknown actors who replaced the personal information with fictitious data and exchanged names of databases tagged with this advice: “please_secure_your_servers”.

Database exposed after rape by unknown actors. IMAGE: Comparitech

Diachenko partnered with the technology comparison site Comparitech in this paper last month. Comparitech said the database was exposed for nearly two weeks, available online without password protection, before it was removed.

The timeline

This is what happened when, Comparitech says:

  • December 4, 2019 – First database indexed by search engines.
  • December 12, 2019 – The data was posted as a download on a hacker forum.
  • December 14, 2019: Diachenko discovered the database and immediately sent an abuse report to the ISP that manages the server’s IP address.
  • December 19, 2019 – Access to the database was removed.
  • March 2, 2020 – The BinaryEdge search engine indexed a second server containing identical records plus an additional 42 million.
  • March 4, 2020: Diachenko discovered the second server and alerted the hosting provider.
  • March 4, 2020 – The server was attacked and destroyed by unknown actors.

The initial breach exposed 267,140,436 records of what were mostly Facebook users in the US. USA Diachenko said all the records appeared to be valid. The same 267 million records were exposed on the second server in March 2020, but this time, the exhibition included an additional 42 million records, hosted on a US Elasticsearch server. USA