Facebook says it stored millions of passwords in plain text, sparking security fears
'Under no circumstances' should passwords be stored in plain text, cybersecurity expert says
Facebook said Thursday that it stored millions of its users' passwords in plain text for years.
The acknowledgement from the social media giant came after a security researcher posted about the issue online.
"Security rule 101 dictates that under no circumstances passwords should be stored in plain text, and at all times must be encrypted," said cybersecurity expert Andrei Barysevich of Recorded Future.
"There is no valid reason why anyone in an organization, especially the size of Facebook, needs to have access to users' passwords in plain text."
Facebook said there is no evidence its employees abused access to this data. But thousands of employees could have searched them.
The company said the passwords were stored on internal company servers, where no outsiders could access them. But the incident reveals a huge oversight for the company amid a slew of bruises and stumbles in the last couple of years.
Facebook will notify millions of users
The security blog KrebsOnSecurity said some 600 million Facebook users may have had their passwords stored in plain text. Facebook said in a blog post Thursday it will likely notify "hundreds of millions" of Facebook Lite users, millions of Facebook users and tens of thousands of Instagram users that their passwords were stored in plain text.
Facebook Lite is designed for users with older phones or low-speed internet connections and is used primarily in developing countries.
Facebook said it discovered the problem in January. But, according to Brian Krebs, the security researcher, in some cases the passwords had been stored in plain text since 2012. Facebook Lite launched in 2015 and Facebook bought Instagram in 2012.
Barysevich said he could not recall any major company caught leaving so many passwords exposed internally. He said he's seen a number of instances where much smaller organizations made such information readily available not just to programmers but also to customer support teams.
Speaking to CBC News' Meegan Read, security researcher Chester Wisniewski at Sophos in Vancouver, said he was "a little bit astounded" at this news.
If indeed thousands of employees accessed the data set, said Wisniewski, it seems unlikely that none of them would have alerted the company's leaders.
"You can't trust what companies are doing with your password, and when news like this comes out — no matter what you're hearing — change your password now."
With files from CBC News.