CYBER NEWS

CanaryTrap Method Identifies 16 Facebook Apps Guilty of Data Misuse


Privacy on social media should be a top concern for online users. However, most people remain unaware of the misdeeds of social networks and app developers who often abuse their personal information.

The CanaryTrap Method Helps Identify Data Misuse

Fortunately, a group of academics has created a method which can aid the identification of Facebook app developers that share user data with third-parties. The method has been dubbed CanaryTrap. Let’s see how it works.




There are plenty of examples of data misuse of third-party app developers. In general, single sign-on (SSO) apps on Facebook usually require access to a user’s personal details, such as email address, date of birth, gender, and likes.

The problem is that third-party apps with access to personal details of a large number of users have a high potential for misuse, the researchers point out in their white paper. The number of high-profile incidents of data misuse by third-party apps on online social networks is bigger than it should be. Let’s not forget the Cambridge Analytica scandal.

There is a lack of methods to systematically detect data misuse by third-party apps. The main issue is that online social networking platforms lose control over their data once it is retrieved by third-party apps. These third-party apps can store the retrieved data on their servers from where it can be further transferred to other entities. Neither users nor online social networks have any visibility on the use of data stored on the servers of third-party apps. This makes the problem of detecting data misuse extremely challenging since itis hard to track something not under your control.

So, how will the CanaryTrap method help against the issue of data misuse?

CanaryTrap Method Explained

The CanaryTrap method revolves around something called a honeytoken. Honeytokens are described as fictitious words or records, added to legitimate databases. Honeytokens allow administrators to track data in cases they wouldn’t be able to track. Honeytokens can be email address or credit card details which can be leaked or shared intentionally to detect their unrecognized or potentially unauthorized use, the paper explains. This detection is done with the help of different monitoring channels:

For example, if an email address is shared as a honeytoken then received emails act as the channel for detecting unrecognized use of the shared email address. We design and implement CanaryTrap to investigate misuse of data shared with third-party apps on Facebook. We share the email address associated with a Facebook account as a honeytoken by installing a third-party app and then monitor the received emails to detect any unrecognized use of the shared email address. We conclude that a honeytoken shared with a third-party app has been potentially misused if the sender of a received email cannot be recognized as the third-party app.

The researchers also leverage the fact that advertisers on Facebook have the ability to use email addresses to target custom audiences. The team uses Facebook’s ad transparency tool, called “Why Am I Seeing This?” to observe advertisers who have used the shared honeytoken to run ad campaigns to custom audiences on the social platform. The conclusion is that honeytokens which were shared with a third-party app have been misused in case the advertiser can’t be recognized as the third-party app.

The researchers said they tested 1,024 Facebook apps of which they found 16 apps sharing email addresses with third-parties. This resulted in users receiving emails from unknown senders. Only 9 of the 16 apps disclosed they were associated with the email sender. The low number of such detected apps is because of the small sample of 1,204 apps which were used in the research. The team believes that if more apps are investigated, the number of apps misusing user information will be much bigger.


Facebook’s Mishandling of User Data Is Not News

In April 2019, UpGuard Cyber Risk researchers discovered half a billion records of millions of users of Facebook which were openly available to the public internet. The records were found on unprotected Amazon cloud servers. Apparently, two third-party developed Facebook app datasets were exposing users’ details to the public internet.

All the data sets had something in common – they all originated from Facebook users and presented sensitive information in detail, such as interests, relationships, and interactions. These details were available to third-party app developers.

In May 2020, Facebook faced another penalty over false data privacy claims. According to Canada’s Competition Bureau, Facebook has mishandled user information by creating the false feeling that users could control who could see and access their personal information via privacy features. The penalty is estimated at CAD 9 million, which equals USD 6.5 million, and EUR 5.9 million.

Milena Dimitrova

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the beginning. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...