Facebook Confirms Hackers Didn’t Exploit Stolen Logins on External Sites – Digital News

Facebook Confirms Hackers Didn’t Exploit Stolen Logins on External Sites – Digital News

html

Facebook Tells Hackers Didn’t Sneak Into Facebook Login Users’ Apps

New York, Aug 25 – After a cyber‑catastrophe last week that rattled millions of accounts, Facebook has released a reassuring follow‑up that the infamous breach didn’t spill over into the apps that let people sign in with their Facebook credentials.

Key Takeaways

  • No third‑party apps accessed – Facebook’s security team found no signs of hackers hijacking other sites that use Facebook Login.
  • Shares slid 1.9 % – the company’s stock dropped to $159.33, still a rough spot after the scare.
  • Why the scare mattered – With over 42,000 sites pegged to Facebook Login, the possibility of cross‑site infiltration was a genuine worry.
  • GDPR pressure – EU rules force companies to disclose breaches within 72 hours, pushed Facebook to give an early, potentially alarm‑raising report.
  • Ongoing investigations – Standing giants like SkyScanner, IKEA’s TaskRabbit, and Uber are digging into the fallout.

What the Verdict Means

At a glance, the news is a breather. Guy Rosen, Facebook’s VP of Security, told Reuters that the investigation did not surface any malicious activity on the third‑party side. It does not just mean “no fuss for now,” though. Companies that rely on Facebook Login were wise to start probing their own logs.

Why the Initial Alarm Was Realistic

EU’s GDPR imposes a hard 72‑hour clock on breach reporting. Security experts say: “If you break out data, you don’t have enough time to understand the damage fully,” Alex Stamos, a former CISO, ironically tweeted after the initial alert. His snarky timing was a direct jab at how skinny the compliance window is, and it might have felt long‑been tactical on Facebook’s part.

So… what’s next?

  1. Uber has terminated active Facebook sessions during the probe.
  2. SkyScanner and IKEA’s TaskRabbit are checking their user data for any phantom footprint.
  3. Facebook’s own internal filters are tightening up to protect against a repeat.

In short: the company’s saying they’ve locked the breach down on its own platform. It’s less “translation error” and more “step back, let’s not be cocky.” The next weeks will tell if the outer world shook out what, if anything, slipped through the cracks. Stay tuned, folks—encryption drama thrives on the edge.