Third-parties abusing 'Facebook Login' to steal users' data: Report

IANS  |  San Francisco 

Several third-party trackers are abusing Login, exfiltrating users' data including name, address, age range, gender, locale and profile photo, a new security research report has claimed.

"Rather, it is due to the lack of security boundaries between the first-party and third-party scripts in today's web," said the report prepared by Steven Englehardt, and Arvind Narayanan, researchers at Freedom to Tinker -- a digital initiative by Princeton University's Center for Policy.

"We report yet another type of surreptitious data collection by third-party scripts that we discovered: the exfiltration of personal identifiers from websites through "login with Facebook" and other such APIs," the trio wrote.

Meanwhile, told the Tech Crunch that they were investigating into the security research report.

The researchers found two types of vulnerabilities: Seven third parties abusing websites' access to user data and one third party using its own "application" to track users around the web.

British political consultancy firm was found misusing users' data collected by a quiz app which used the "Login with Facebook" feature.

"We've uncovered an additional risk: when a user grants a website access to their profile, they are not only trusting that website but also third parties embedded on that site," the report noted.

The researchers found seven scripts collecting user data using the first party's access.

"These scripts are embedded on a total of 434 of the top 1 million sites, including fiverr.com, bhphotovideo.com, and mongodb.com," they wrote.

The user ID collected through the is specific to the website (or the "application" in Facebook's terminology), which would limit the potential for cross-site tracking.

"But these app-scoped user IDs can be used to retrieve the global ID, user's profile photo, and other public profile information, which can be used to identify and track users across websites and devices," the researchers warned.

"While we can't say how these trackers use the information they collect, we can examine their marketing material to understand how it may be used," they noted.

OnAudience, AudienceStream, Lytics, and ProPS all offer some form of "customer data platform", which collect data to help publishers to better monetise their users.

Forter offers "identity-based fraud prevention" for while Augur offers cross-device tracking and

Hidden third-party trackers can also use "Login to deanonymise users for targeted advertising".

"This is a privacy violation, as it is unexpected and users are unaware of it," the researchers said.

There are steps and other providers can still take to prevent abuse.

"use can be audited to review how, where, and which parties are accessing data. could also disallow the lookup of profile picture and global IDs by app-scoped user IDs," the report emphasised.

"It might also be the right time to make Anonymous Login with available following its announcement four years ago," the researchers added.

--IANS

na/pgh/

(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

First Published: Thu, April 19 2018. 10:38 IST