Jump to content

Recommended Posts

  • FPCH Admin
Posted

fb-passport-600.jpg

 

 

A hacker successfully commandeered a Facebook user's profile by conducting a social engineering attack that involved a fake passport.

 

The hack occurred on June 26 when an unidentified attacker contacted the Facebook support team posing as Aaron Thompson, a legitimate Facebook user and resident of Michigan in the United States.

 

The hacker's original message reads:

 

"Hi. I don't have anymore access on my mobile phone number. Kindly turn off code generator and login approval from my account. Thanks."

 

In its response, Facebook provided the hacker with a few recommendations for how they could regain access. They also said the Thompson poser could provide Facebook with two things if it still wasn't possible to access the profile: a scan of a photo ID and a description of the issue being experienced.

 

The attacker replied with this fake passport.

 

fc7adcdbb031d8d873e63a40d1b4f5bc.jpg

 

Facebook could have easily determined that none of the details provided in the passport match the real Aaron Thompson's profile.

 

Still, it was enough for the site's support staff, who disabled Thompson's login approval settings and granted the hacker access to the account.

 

Facebook sent a message to the email address attached to Thompson's profile explaining the change in his account settings:

 

86e1cfaa3010ded7177c9ef7cf72080d.png

 

It was then that Thompson first learned of the hack.

 

But, by then, the attacker had already gained access to Thompson's account, including his access to several business pages he managed on Facebook.

 

Motherboard reports Thompson is convinced the hacker targeted him in an attempt to monetize his pages.

 

But the attacker did no such thing. Instead he sent out only a few messages to the hacked user's friends. Most notably, he sent an image of his genitals to the victim's girlfriend.

 

Thompson contacted Facebook support but initially experienced some difficulty in resolving the issue. Frustrated, he decided to share his story on Reddit, where he said he was "pretty devastated" about the "blatant harassment" the hacker had perpetrated against him and his social circle.

 

Shortly thereafter, Facebook's support team stepped it into high gear and helped Thompson regain access to his account and business pages.

 

A Facebook spokesperson said the incident should never have happened:

 

"Accepting this ID was a mistake that violated our own internal policies and this case is not the norm."

 

Clearly, no matter how many security features we might enable on our accounts, including two-step verification (2SV), human error can still threaten our account security.

 

That's why companies like Facebook should continuously review and update their security policies, not to mention regularly train their employees to not fall for a social engineering attack like the one that locked Thompson out of his account.

 

Source: graham cluley

~I know that you believe you understand what you think I said, but I'm not sure you realize that what you heard is not what I meant.~

~~Robert McCloskey~~

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...