Honolulu Star-Advertiser

Tuesday, December 10, 2024 77° Today's Paper


Top News

Facebook left millions of user passwords readable by employees

ASSOCIATED PRESS

A Facebook start page seen on a smartphone, in Aug. 2018, in Surfside, Fla. Facebook said today, that it stored millions of its users’ passwords in plain text for years.

SAN FRANCISCO >> Facebook left millions of user passwords readable by its employees for years, the company said today, an acknowledgment it offered after a security researcher posted about the issue online.

“Security rule 101 dictates that under no circumstances passwords should be stored in plain text, and at all times must be encrypted,” said cybersecurity expert Andrei Barysevich of Recorded Future. “There is no valid reason why anyone in an organization, especially the size of Facebook, needs to have access to users’ passwords in plain text.”

Facebook said there is no evidence its employees abused access to this data. But thousands of employees could have searched them. The company said the passwords were stored on internal company servers, where no outsiders could access them. But the incident reveals a huge oversight for the company amid a slew of bruises and stumbles in the last couple of years.

The security blog KrebsOnSecurity said some 600 million Facebook users may have had their passwords stored in plain text. Facebook said in a blog post today it will likely notify “hundreds of millions” of Facebook Lite users, millions of Facebook users and tens of thousands of Instagram users that their passwords were stored in plain text. Facebook Lite is designed for users with older phones or low-speed internet connections and is used primarily in developing countries.

Facebook said it discovered the problem in January. But, according to Brian Krebs, the security researcher, in some cases the passwords had been stored in plain text since 2012. Facebook Lite launched in 2015 and Facebook bought Instagram in 2012.

Barysevich said he could not recall any major company caught leaving so many passwords exposed internally. He said he’s seen a number of instances where much smaller organizations made such information readily available not just to programmers but also to customer support teams.

By participating in online discussions you acknowledge that you have agreed to the Terms of Service. An insightful discussion of ideas and viewpoints is encouraged, but comments must be civil and in good taste, with no personal attacks. If your comments are inappropriate, you may be banned from posting. Report comments if you believe they do not follow our guidelines. Having trouble with comments? Learn more here.