Mark Zuckerberg’s Facebook Page Gets Hacked To Prove A Point?
A Palestinian hacker took matters into his own hands late last week Thursday when he discovered a Facebook bug and was rebuffed by the company’s official engineers when he alerted them. Khalil Shreateh, a computer programmer in the West Bank, discovered a flaw that allowed him to post on anyone’s wall on the site, even if that user had strict privacy settings. Shreateh initially submitted his find to Facebook’s “white-hat” program, a system that lets benevolent computer hackers tell Facebook about security flaws. Facebook pays a minimum of $500 for each bug, as long as the hacker doesn’t disclose the loophole before the company has time to address it.
But when the engineering team didn’t seem to think the problem was real, Shreateh decided to prove that the bug he found did indeed exist. So, he simply posted on the private wall of Facebook CEO Mark Zuckerberg.
As he tells it on his blog, Shreateh, who has limited proficiency in English, submitted details of the bug twice. He writes that he was told “I am sorry this is not a bug” by a Facebook engineer after the second notification. That’s when, for better or worse, Shreateh exploited the loophole to post a video on the Timeline of Sarah Goodin, one of Zuckerberg’s college friends, and on Zuckerberg’s page itself.
Minutes after the post on Zuckerberg’s Timeline appeared, Facebook engineer Ola Okelola asked Shreateh to describe the exploit by email. Facebook briefly disabled Shreateh’s account as a precaution while the loophole was patched on Thursday.
Another member of Facebook’s security wrote that the lack of complete information and Shreateh’s limited English made responding to the request difficult. We’ve reached out to Shreateh for comment. In response to the incident, Facebook pointed to an “official comment” posted on Hacker News, where engineer manager Matt Jones wrote that the company “should have pushed back asking for more details here.” But, Jones wrote, that doesn’t mean Shreateh will be getting a reward for exposing the bug.
However, Shreateh will not be awarded the deserved $500 because he ‘violated’ Facebook’s privacy terms by posting on walls of two people who were not his friends. But a crowdsourced funding campaign has been set up by Marc Maiffret, the chief technology officer of security firm BeyondTrust to reward $12,000 to Shreateh with $11,741 already raised so far.