Facebook’s race to prove it’s a good and trustworthy company over the last few months kicked off when it was revealed that a quiz app sold user data to a political firm. Now, a different quiz app is getting some heat. A researcher discovered that a third-party app called NameTests left the data of 120 million Facebook users exposed to anyone who happened to find it.
Facebook’s privacy scandal discovery of the NameTests security flaw.
The NameTest vulnerability may have been a simple mistake or an example of negligence, but it’s certainly a visceral example of how little oversight Facebook has over user data as it floats out to the world across thousands of apps. A determined hacker could use those data points to accomplish all sorts of nefarious activities. In the shady porn site example, De Ceukelaire cites the potential for blackmailing a user by revealing their activities to their friends and family.
The NameTest discovery not only demonstrates how much we still don’t know about third-party apps that were supplied with our data, it also shows the creaky process behind Facebook’s Data Abuse Bounty. De Ceukelaire says he reported the issue on April 22, and eight days later, Facebook responded that it was looking into it. On May 14, he checked in to see if Facebook had contacted the NameTest developers. Eight days later Facebook replied that it could potentially take three to six months to go through an investigation. Meanwhile, NameTest was just sitting there with this easily observable security hole.
Time went on with no word from Facebook and on June 25, De Ceukelaire noticed that NameTest had fixed the issue. After contacting Facebook, it acknowledged the fix and agreed to donate $US8,000 ($10,882) to the Freedom of the Press Foundation as part of its reward for the bounty. So according to De Ceukelaire, Facebook took at least a month to fix the problem, and it had to be hunted down to fulfil its bounty promise.
When we contacted NameTest’s parent company, Social Sweethearts, about the issue, a spokesperson told us:
The investigation found that there was no evidence that personal data of users was disclosed to unauthorised third parties and all the more that there was no evidence that it had been misused. Nevertheless, data security is taken very seriously at social sweethearts and measures are currently being taken to avoid risks in the future.
We asked Facebook if this sort of slow response is common with its bounty program. We were given a boilerplate statement attributed to Ime Archibong, Facebook’s vice president of product partnerships. It reads, in full:
A researcher brought the issue with the nametests.com website to our attention through our Data Abuse Bounty Program that we launched in April to encourage reports involving Facebook data. We worked with nametests.com to resolve the vulnerability on their website, which was completed in June.
Facebook also pointed us to a blog post on its bug bounty page that went up this morning. It doesn’t contain any more info and is framed as if it’s a voluntary announcement praising De Ceukelaire’s find and celebrating its work with NameTest’s team to fix the problem. The reality is Facebook is once again opening up about an issue it’s known about for some time, only after it’s been publicly called out. The cycle is tiresome and firmly ingrained in the company’s DNA.
We’re going to see more revelations about third-party apps mishandling data; Facebook has been pretty clear about that. But it also appears that Facebook is moving painfully slow when it comes to addressing issues when they arise. Maybe Facebook can divert some resources from its freshly-canceled drone program into building out the bounty team to speed things up.