Analysis Multiple Chrome web browser extensions utilize a session token for Meta’s Facebook that grants access to signed-in users’ social media network information in a manner that breaks the business’s policies and leaves users open to possible personal privacy offenses.
Security scientist Zach Edwards recently kept in mind that Brave had actually obstructed a Chrome extension called L.O.C. out of issue it exposed the user’s Facebook information to a third-party server with no notification or approval trigger.
L.O.C. made use of a gain access to token that can be quickly gotten from Facebook’s Creator Studio web app. After extracting this token– a text string made up of 192 letters and numbers– from the app, the internet browser extension has the ability to utilize it with Facebook’s Graph API without being an authorized third-party Facebook app to bring information about the signed-in user.
It does so, its designer states, to enable users to automate the processing of their Facebook information.
The issue is that information gain access to of this sort might be mistreated, as it has actually remained in the past. An extension using this token could, for instance, copy the user’s information and send it to a remote server without the user’s understanding or permission. Or it might save the user’s name and e-mail and utilize that for tracking the specific throughout sites.
Here’s how a theoretical information theft might happen:
- You produce and launch a relatively innocent Chrome extension that can bring gain access to tokens from Facebook’s Creator Studio.
- Whenever a victim installs your Chrome extension and is signed into Facebook, the extension gets among these tokens on the victim’s behalf to quietly access their Facebook information through the social media network’s Graph API.
- The extension then exfiltrates the victim’s information to a remote server.
The capability to get a gain access to token from the Creator Studio supplies a path for extensions to silently, immediately harvest signed-in users’ profile information without authorization and without needing to, state, scrape pages.
The gain access to token is acquired by bring this page and drawing out accessToken from the source.
In September 2018, Facebook acknowledged a security problem impacting nearly 50 million accounts, which it credited to wrongdoers taking gain access to tokens provided by its “View As” function to permit individuals to see how their profiles seek to others.
” This enabled them to take Facebook gain access to tokens which they might then utilize to take control of individuals’s accounts,” discussed Guy Rosen, who was VP of Product Management at the time and is now VP of Integrity at Meta. “Access tokens are the equivalent of digital secrets that keep individuals visited to Facebook so they do not require to re-enter their password whenever they utilize the app.”
The gain access to token readily available through Creator Studio does not posture the very same hazard of account takeover as the “View As” token.
A Meta representative informed us through e-mail that these sorts of tokens have genuine usages and supply no access to information beyond what’s readily available to a specific account holder. And Meta stated there’s no sign that the L.O.C. extension has actually been exfiltrating details from individuals’s gadgets. The token does offer programmatic access to information about signed-in Facebook users without permission or authorization.
It was this threat that triggered web browser maker Brave to obstruct the L.O.C. extension, up until designer Loc Mai got in touch with Brave’s advancement group. A Brave representative stated the business is dealing with the developer to make some modifications– most likely a notice or consent trigger– so the extension is appropriate from a personal privacy and security viewpoint.
And it’s a threat that should issue Meta and its subsidiaries provided Facebook’s 2019 settlement of an FTC examination that followed from the Cambridge Analytica scandal. As part of that offer, Facebook devoted to restricting third-party access to user information.
Cambridge Analytica got individuals’s Facebook profile details by means of a third-party test app that plugged into the social media network. There are parallels here: you hope that a test app will not share your Facebook profile information with others, and you hope a Chrome extension prevents that, too.
Though Facebook swore to put in location procedures to avoid another Cambridge Analytica mess, the Creators Studio gain access to tokens in the hands of a destructive and extensively set up Chrome extension might result in a repeat of history.
” Under the brand-new structure needed by the FTC, we’ll be responsible and transparent about repairing old items that do not work the method they must and developing brand-new items to a greater requirement,” Facebook firmly insisted when it assured to tidy up information gain access to almost 3 years earlier.
We’re handling it, sort of
In an e-mail to The Register, a Meta representative stated the business is handling these extensions however that needs the assistance of Google.
” The gain access to tokens that these extensions demand assistance developers and others to utilize our tools and items however aren’t efficient in accessing information beyond what individuals can do with their own account or what the session cookie on their internet browser currently offers,” Meta’s representative stated in an e-mail.
” Since setting up web browser extensions can bring threat, we routinely report ones that breach our policies to web browser makers like Google to have them eliminated, as we performed in this case. This work is handled by our devoted External Data Misuse group that concentrates on identifying, obstructing, and hindering incorrect automated usage of our services.”
Part of the concern is that Google’s Chrome extensions are simple to overturn or abuse and Meta does not have a direct method to avoid the publication of extensions that abuse its Graph API, apart from reporting the concern to Google.
Meta’s representative stated that the Creator Studio token is scoped to the user’s session, which suggests it will end if the extension user logs out of Facebook. And if the token has actually not been sent to the extension designer’s server, as seems the case with the L.O.C. extension, then uninstalling the extension will likewise trigger the token to end.
The token, we’re informed, is not the issue. Rather internet browser extensions permit users to automate Facebook activities. Meta’s representative encouraged individuals to be careful when setting up extensions and stated web browser makers like Google require to be watchful and get rid of hazardous extensions from their web shops.
- Facebook exposes ‘god mode’ token that might siphon information
- UK regulator ‘broke global law’, states Facebook
- Grab some tissues: Meta’s share rate tanks after Facebook produces most current figures
- This is working out: Meta includes anti-grope buffer zone around metaverse VR avatars
Edwards informed The Register that this is an odd issue due to the fact that if somebody can be persuaded to set up among these extensions, that trust might be quickly mistreated. Facebook, he stated, isn’t offering any notification to users based upon the information consents they’ve approved, which varies from the notification and permission triggers that follow from allowed programmatic interaction with the social media.
So far, no action has actually been taken, and according to Edwards, there are a number of Chrome extensions a minimum of that likewise co-opt the Creator Studio gain access to token to permit information to be brought through the Facebook Graph API.
J2TEAM Security (200 K users), MonokaiToolkit (10 K users), FBVN (80,000 users), and KB2A Tool (50,000 users) all use this token, according to Edwards. He described these all appear to have actually come out of a Facebook group often visited by Vietnamese-speaking designers who hunt Facebook tokens, seemingly to offer services the social media network does not use.
The Register has no factor to think these designers are misusing user information. J2TEAM Security professes to obstruct Facebook phishing URLs. It is totally possible to utilize Facebook’s gain access to token to promote security instead of damage it.
But the reality that this group of designers can access Facebook users’ information through the Graph API in manner ins which break Facebook guidelines– and has actually been doing so a minimum of given that 2017– reveals there is a space in between having guidelines and imposing them.
Meta insists it is handling these extensions and indicated its External Data Misuse efforts. The web giant’s representative repeated that the business routinely does something about it to implement its policies and kept in mind that Facebook formerly sent out a stop and desist letter to the designer of the L.O.C. extension and prohibited him from the platform– though that’s not done anything to disable the extension.
We’re informed Meta has actually made another demand to Google to get rid of the extension from its Chrome Web Store and is taking a look at the other extensions discussed above.
Even so, abuse of these sorts of tokens looks most likely to continue due to the fact that Meta states they have genuine usage cases, like making it possible for access to its Creator Studio app and supporting performance like Recent Posts in the Creator Home tab. ®
Analysis Multiple Chrome web browser extensions utilize a session token for Meta’s Facebook that grants access to signed-in users’ social media network information in a manner that breaks the business’s policies and leaves users open to possible personal privacy offenses.
Security scientist Zach Edwards recently kept in mind that Brave had actually obstructed a Chrome extension called L.O.C. out of issue it exposed the user’s Facebook information to a third-party server with no notification or approval trigger.
L.O.C. made use of a gain access to token that can be quickly gotten from Facebook’s Creator Studio web app. After extracting this token– a text string made up of 192 letters and numbers– from the app, the internet browser extension has the ability to utilize it with Facebook’s Graph API without being an authorized third-party Facebook app to bring information about the signed-in user.
It does so, its designer states, to enable users to automate the processing of their Facebook information.
The issue is that information gain access to of this sort might be mistreated, as it has actually remained in the past. An extension using this token could, for instance, copy the user’s information and send it to a remote server without the user’s understanding or permission. Or it might save the user’s name and e-mail and utilize that for tracking the specific throughout sites.
Here’s how a theoretical information theft might happen:
- You produce and launch a relatively innocent Chrome extension that can bring gain access to tokens from Facebook’s Creator Studio.
- Whenever a victim installs your Chrome extension and is signed into Facebook, the extension gets among these tokens on the victim’s behalf to quietly access their Facebook information through the social media network’s Graph API.
- The extension then exfiltrates the victim’s information to a remote server.
The capability to get a gain access to token from the Creator Studio supplies a path for extensions to silently, immediately harvest signed-in users’ profile information without authorization and without needing to, state, scrape pages.
The gain access to token is acquired by bring this page and drawing out accessToken from the source.
In September 2018, Facebook acknowledged a security problem impacting nearly 50 million accounts, which it credited to wrongdoers taking gain access to tokens provided by its “View As” function to permit individuals to see how their profiles seek to others.
” This enabled them to take Facebook gain access to tokens which they might then utilize to take control of individuals’s accounts,” discussed Guy Rosen, who was VP of Product Management at the time and is now VP of Integrity at Meta. “Access tokens are the equivalent of digital secrets that keep individuals visited to Facebook so they do not require to re-enter their password whenever they utilize the app.”
The gain access to token readily available through Creator Studio does not posture the very same hazard of account takeover as the “View As” token.
A Meta representative informed us through e-mail that these sorts of tokens have genuine usages and supply no access to information beyond what’s readily available to a specific account holder. And Meta stated there’s no sign that the L.O.C. extension has actually been exfiltrating details from individuals’s gadgets. The token does offer programmatic access to information about signed-in Facebook users without permission or authorization.
It was this threat that triggered web browser maker Brave to obstruct the L.O.C. extension, up until designer Loc Mai got in touch with Brave’s advancement group. A Brave representative stated the business is dealing with the developer to make some modifications– most likely a notice or consent trigger– so the extension is appropriate from a personal privacy and security viewpoint.
And it’s a threat that should issue Meta and its subsidiaries provided Facebook’s 2019 settlement of an FTC examination that followed from the Cambridge Analytica scandal. As part of that offer, Facebook devoted to restricting third-party access to user information.
Cambridge Analytica got individuals’s Facebook profile details by means of a third-party test app that plugged into the social media network. There are parallels here: you hope that a test app will not share your Facebook profile information with others, and you hope a Chrome extension prevents that, too.
Though Facebook swore to put in location procedures to avoid another Cambridge Analytica mess, the Creators Studio gain access to tokens in the hands of a destructive and extensively set up Chrome extension might result in a repeat of history.
” Under the brand-new structure needed by the FTC, we’ll be responsible and transparent about repairing old items that do not work the method they must and developing brand-new items to a greater requirement,” Facebook firmly insisted when it assured to tidy up information gain access to almost 3 years earlier.
We’re handling it, sort of
In an e-mail to The Register, a Meta representative stated the business is handling these extensions however that needs the assistance of Google.
” The gain access to tokens that these extensions demand assistance developers and others to utilize our tools and items however aren’t efficient in accessing information beyond what individuals can do with their own account or what the session cookie on their internet browser currently offers,” Meta’s representative stated in an e-mail.
” Since setting up web browser extensions can bring threat, we routinely report ones that breach our policies to web browser makers like Google to have them eliminated, as we performed in this case. This work is handled by our devoted External Data Misuse group that concentrates on identifying, obstructing, and hindering incorrect automated usage of our services.”
Part of the concern is that Google’s Chrome extensions are simple to overturn or abuse and Meta does not have a direct method to avoid the publication of extensions that abuse its Graph API, apart from reporting the concern to Google.
Meta’s representative stated that the Creator Studio token is scoped to the user’s session, which suggests it will end if the extension user logs out of Facebook. And if the token has actually not been sent to the extension designer’s server, as seems the case with the L.O.C. extension, then uninstalling the extension will likewise trigger the token to end.
The token, we’re informed, is not the issue. Rather internet browser extensions permit users to automate Facebook activities. Meta’s representative encouraged individuals to be careful when setting up extensions and stated web browser makers like Google require to be watchful and get rid of hazardous extensions from their web shops.
- Facebook exposes ‘god mode’ token that might siphon information
- UK regulator ‘broke global law’, states Facebook
- Grab some tissues: Meta’s share rate tanks after Facebook produces most current figures
- This is working out: Meta includes anti-grope buffer zone around metaverse VR avatars
Edwards informed The Register that this is an odd issue due to the fact that if somebody can be persuaded to set up among these extensions, that trust might be quickly mistreated. Facebook, he stated, isn’t offering any notification to users based upon the information consents they’ve approved, which varies from the notification and permission triggers that follow from allowed programmatic interaction with the social media.
So far, no action has actually been taken, and according to Edwards, there are a number of Chrome extensions a minimum of that likewise co-opt the Creator Studio gain access to token to permit information to be brought through the Facebook Graph API.
J2TEAM Security (200 K users), MonokaiToolkit (10 K users), FBVN (80,000 users), and KB2A Tool (50,000 users) all use this token, according to Edwards. He described these all appear to have actually come out of a Facebook group often visited by Vietnamese-speaking designers who hunt Facebook tokens, seemingly to offer services the social media network does not use.
The Register has no factor to think these designers are misusing user information. J2TEAM Security professes to obstruct Facebook phishing URLs. It is totally possible to utilize Facebook’s gain access to token to promote security instead of damage it.
But the reality that this group of designers can access Facebook users’ information through the Graph API in manner ins which break Facebook guidelines– and has actually been doing so a minimum of given that 2017– reveals there is a space in between having guidelines and imposing them.
Meta insists it is handling these extensions and indicated its External Data Misuse efforts. The web giant’s representative repeated that the business routinely does something about it to implement its policies and kept in mind that Facebook formerly sent out a stop and desist letter to the designer of the L.O.C. extension and prohibited him from the platform– though that’s not done anything to disable the extension.
We’re informed Meta has actually made another demand to Google to get rid of the extension from its Chrome Web Store and is taking a look at the other extensions discussed above.
Even so, abuse of these sorts of tokens looks most likely to continue due to the fact that Meta states they have genuine usage cases, like making it possible for access to its Creator Studio app and supporting performance like Recent Posts in the Creator Home tab. ®

















































