Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

No Reward for Hacking Zuckerberg’s Facebook Page

SAN FRANCISCO – A researcher who hacked into Facebook chief Mark Zuckerberg’s profile to expose a security flaw won’t get the customary reward payment from the social network.

While Facebook offers rewards for those who find security holes, it seems that Palestinian researcher Khalil Shreateh went too far by posting the information on Zuckerberg’s own profile page.

SAN FRANCISCO – A researcher who hacked into Facebook chief Mark Zuckerberg’s profile to expose a security flaw won’t get the customary reward payment from the social network.

While Facebook offers rewards for those who find security holes, it seems that Palestinian researcher Khalil Shreateh went too far by posting the information on Zuckerberg’s own profile page.

Shreateh said on his blog he found a way for Facebook users to circumvent security and modify a user’s timeline.

He said he took the unusual step of hacking into Zuckerberg’s profile after being ignored by the Facebook security team.

“So i did post to Mark Zuckerberg’s timeline , as those pictures shows,” he said, including screen shots of the posting.

“Dear Mark Zuckerberg,” he wrote.”First sorry for breaking your privacy and post to your wall, i had no other choice to make after all the reports i sent to Facebook team. My name is KHALIL from Palestine.”

His reward for exposing the flaw was having his Facebook account disabled.

He later got a message saying, “We are unfortunately not able to pay you for this vulnerability because your actions violated our Terms of Service. We do hope, however, that you continue to work with us to find vulnerabilities in the site.”

Facebook said it appreciates help with security but not by hacking into user accounts.

Facebook security engineer Matt Jones posted a comment Sunday on a security forum saying “we fixed this bug on Thursday,” and admitted that “we should have asked for additional… instructions after his initial report.”

“We get hundreds of reports every day,” Jones said. “We have paid out over $1 million to hundreds of reporters. However, many of the reports we get are nonsense or misguided.”

Jones added that “the more important issue here is with how the bug was demonstrated using the accounts of real people without their permission.”

“We welcome and will pay out for future reports from him (and anyone else!) if they’re found and demonstrated within these guidelines,” Jones said on the YCombinator hacker news forum.

Independent security researcher Graham Cluley said he had “some sympathy” with Facebook on the issue.

“Although he was frustrated by the response from Facebook’s security team, Shreateh did the wrong thing by using the flaw to post a message on Mark Zuckerberg’s wall,” Cluley said on his blog.

Written By

AFP 2023

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Vulnerabilities

Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.