Endpoint

4/11/2018
05:35 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Facebook Rolls Out 'Data Abuse Bounty' Program

The social media giant also got hit with a lawsuit the day before unveiling its new reward program.

All eyes are on Facebook as the company wades its way through a sticky controversy centered on users' privacy. As CEO Mark Zuckerberg testified before Congress this week regarding the Cambridge Analytica scandal, the social media giant rolled out a "Data Abuse Bounty" program to catch applications on the platform inappropriately using personal data.

Meanwhile, Facebook and Cambridge Analytica, along with SCL Group Limited and Global Science Research Limited (GSR), on Monday April 9 were hit with a class-action lawsuit filed by lawyers in the US and the UK who accuse the defendants of misusing data belonging to 71.6 million Facebook users. The suit also names Steve Bannon, Donald Trump's former campaign manager and White House advisor, and Aleksandr Kogan, GSR founding director and Cambridge University neuroscientist.

The lawsuit claims Cambridge Analytica, SCL Group, and GSR collected users' personal data to develop campaigns for the purpose of influencing the 2016 US presidential election and British EU referendum. Facebook, they say, should be held accountable for not taking the proper steps to secure users' information.

Cambridge Analytica reportedly collected this data through a personality quiz created by Kogan as a Facebook app. About 270,000 Facebook users submitted their data through the app; however, the app's design enabled Cambridge Analytica to also collect the information of these participants' friends - bringing the total users affected from 270k to more than 72 million.

This data, reportedly used to build profiles of Facebook users, includes public profile information, names, home and email addresses, page likes, hometown, birthday, and political and religious affiliations.

"Facebook utterly failed in its duty and promise to secure the personal information of millions of its users, and, when aware that this … information was aimed against its owners, it failed to take appropriate action," says co-lead counsel Robert Ruyak, The Guardian reports.

Data Abuse Bounty Program

Facebook has made a series of moves around better protecting users' data. It claims data belonging to most its 2 billion users could have been accessed without their permissions, and the data of 87 million people was taken by Cambridge Analytica. Changes affect Facebook's Events API, Groups API, Call and Text History, App Controls, and Login.

One of its new privacy-focused initiatives is the Data Abuse Bounty Program, which will reward people who report application developers misusing people's information. The project was inspired by Facebook's existing bug bounty program, used to address security flaws, and Facebook had first hinted about launching such an initiative last month.

This bounty program, the first of its kind, will reward those with firsthand knowledge and proof of instances in which an app on the Facebook platform collects and transfers users' data to another party to be sold, stolen, or used for scams or political influence, Facebook explains.

Katie Moussouris, founder and CEO of Luta Security, says "Facebook has a difficult road ahead in regaining trust," and this program will help them do it.

"I advised them on this expansion of their bounty program to encourage more people of conscience to  help them uncover abuse of the data that people have entrusted to them," she says. "Their transparency in enforcement, and prompt notification of users whose data has been compromised is a necessary step on that road to regaining trust."

Marten Mickos, CEO of HackerOne, says "it makes perfect sense" for Facebook to seek outside help in testing and vetting apps that have access to consumer data. This will help it achieve results sooner, he says, but Facebook has to make sure it has the right steps in place.

"Like any bounty program, for Facebook to be successful they must offer clear guidance to researchers, prioritize the incoming reports and necessary fixes, and offer hackers competitive recognition for their contributions," he explains.

As with the bug bounty program, the value of each award will depend on the impact of each report. There is no maximum, Facebook says, but it has awarded as much as $40,000 for high-impact bug reports in the past.

All legitimate reports will be reviewed and receive a response "as quickly as possible" when a credible threat to user data is identified. If abuse is confirmed, the app will be shut down and if necessary, appropriate legal action will be taken against the company buying or selling the data. The person who reported the issue will be paid, and those affected will be alerted.

"Facebook has lost ground on many fronts, and they need to try to regain that lost ground," says Mickos, though he points to the company's willingness to listen. "There are many things Facebook needs to do, and this initiative is a good one."

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for a two-day Cybersecurity Crash Course at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the agenda here. Register with Promo Code DR200 and save $200.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Empathy: The Next Killer App for Cybersecurity?
Shay Colson, CISSP, Senior Manager, CyberClarity360,  11/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Post a Comment
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15759
PUBLISHED: 2018-11-19
Pivotal Cloud Foundry On Demand Services SDK, versions prior to 0.24 contain an insecure method of verifying credentials. A remote unauthenticated malicious user may make many requests to the service broker with different credentials, allowing them to infer valid credentials and gain access to perfo...
CVE-2018-15761
PUBLISHED: 2018-11-19
Cloud Foundry UAA release, versions prior to v64.0, and UAA, versions prior to 4.23.0, contains a validation error which allows for privilege escalation. A remote authenticated user may modify the url and content of a consent page to gain a token with arbitrary scopes that escalates their privileges...
CVE-2018-17190
PUBLISHED: 2018-11-19
In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code ...
CVE-2018-1841
PUBLISHED: 2018-11-19
IBM Cloud Private 2.1.0 could allow a local user to obtain the CA Private Key due to it being world readable in boot/master node. IBM X-Force ID: 150901.
CVE-2018-18519
PUBLISHED: 2018-11-19
BestXsoftware Best Free Keylogger 5.2.9 allows local users to gain privileges via a Trojan horse "%PROGRAMFILES%\BFK 5.2.9\syscrb.exe" file because of insecure permissions for the BUILTIN\Users group.