Endpoint

4/11/2018
05:35 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Facebook Rolls Out 'Data Abuse Bounty' Program

The social media giant also got hit with a lawsuit the day before unveiling its new reward program.

All eyes are on Facebook as the company wades its way through a sticky controversy centered on users' privacy. As CEO Mark Zuckerberg testified before Congress this week regarding the Cambridge Analytica scandal, the social media giant rolled out a "Data Abuse Bounty" program to catch applications on the platform inappropriately using personal data.

Meanwhile, Facebook and Cambridge Analytica, along with SCL Group Limited and Global Science Research Limited (GSR), on Monday April 9 were hit with a class-action lawsuit filed by lawyers in the US and the UK who accuse the defendants of misusing data belonging to 71.6 million Facebook users. The suit also names Steve Bannon, Donald Trump's former campaign manager and White House advisor, and Aleksandr Kogan, GSR founding director and Cambridge University neuroscientist.

The lawsuit claims Cambridge Analytica, SCL Group, and GSR collected users' personal data to develop campaigns for the purpose of influencing the 2016 US presidential election and British EU referendum. Facebook, they say, should be held accountable for not taking the proper steps to secure users' information.

Cambridge Analytica reportedly collected this data through a personality quiz created by Kogan as a Facebook app. About 270,000 Facebook users submitted their data through the app; however, the app's design enabled Cambridge Analytica to also collect the information of these participants' friends - bringing the total users affected from 270k to more than 72 million.

This data, reportedly used to build profiles of Facebook users, includes public profile information, names, home and email addresses, page likes, hometown, birthday, and political and religious affiliations.

"Facebook utterly failed in its duty and promise to secure the personal information of millions of its users, and, when aware that this … information was aimed against its owners, it failed to take appropriate action," says co-lead counsel Robert Ruyak, The Guardian reports.

Data Abuse Bounty Program

Facebook has made a series of moves around better protecting users' data. It claims data belonging to most its 2 billion users could have been accessed without their permissions, and the data of 87 million people was taken by Cambridge Analytica. Changes affect Facebook's Events API, Groups API, Call and Text History, App Controls, and Login.

One of its new privacy-focused initiatives is the Data Abuse Bounty Program, which will reward people who report application developers misusing people's information. The project was inspired by Facebook's existing bug bounty program, used to address security flaws, and Facebook had first hinted about launching such an initiative last month.

This bounty program, the first of its kind, will reward those with firsthand knowledge and proof of instances in which an app on the Facebook platform collects and transfers users' data to another party to be sold, stolen, or used for scams or political influence, Facebook explains.

Katie Moussouris, founder and CEO of Luta Security, says "Facebook has a difficult road ahead in regaining trust," and this program will help them do it.

"I advised them on this expansion of their bounty program to encourage more people of conscience to  help them uncover abuse of the data that people have entrusted to them," she says. "Their transparency in enforcement, and prompt notification of users whose data has been compromised is a necessary step on that road to regaining trust."

Marten Mickos, CEO of HackerOne, says "it makes perfect sense" for Facebook to seek outside help in testing and vetting apps that have access to consumer data. This will help it achieve results sooner, he says, but Facebook has to make sure it has the right steps in place.

"Like any bounty program, for Facebook to be successful they must offer clear guidance to researchers, prioritize the incoming reports and necessary fixes, and offer hackers competitive recognition for their contributions," he explains.

As with the bug bounty program, the value of each award will depend on the impact of each report. There is no maximum, Facebook says, but it has awarded as much as $40,000 for high-impact bug reports in the past.

All legitimate reports will be reviewed and receive a response "as quickly as possible" when a credible threat to user data is identified. If abuse is confirmed, the app will be shut down and if necessary, appropriate legal action will be taken against the company buying or selling the data. The person who reported the issue will be paid, and those affected will be alerted.

"Facebook has lost ground on many fronts, and they need to try to regain that lost ground," says Mickos, though he points to the company's willingness to listen. "There are many things Facebook needs to do, and this initiative is a good one."

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for a two-day Cybersecurity Crash Course at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the agenda here. Register with Promo Code DR200 and save $200.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.