RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Dev & DevSecOpsNovember 30, 2022

Meta’s GDPR fine: Why your DevOps needs red teaming

Richi Jennings
Richi Jennings, Independent industry analyst, editor, and content strategist.Richi Jennings
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
candid of Helen Dixon

Meta’s been fined $276 million for leaking people’s PII. But the leak wasn’t directly via a vulnerability, but rather due to data scraping. Helen Dixon (pictured), the head of Ireland’s GDPR regulator, ruled that Meta should have prevented the scrape.

What can you do to prevent it in your shop? Red-team how legitimate features could be misused. Software supply chain attacks — such as dependency confusion and typo squatting — might also open the door to scrapers.

So monitor real-time usage for unusual patterns. In this week’s Secure Software Blogwatch, we suggest how — and what to do if you find them.

Your humble blogwatcher curated these bloggy bits for your entertainment. Not to mention: Mariah Carey has defrosted.
 

Finebook

Irish Aunty’s Brian O'Donovan reports — “Meta fined €265m”:

“Regulating on behalf of all EU users”
Facebook parent company Meta has been fined … by the Irish Data Protection Commission (DPC) following a data breach which saw the personal details of hundreds of millions of Facebook users published … on an online hacking forum. Facebook said at the time that the information … was "scraped" … by malicious actors through a vulnerability in its … Contact Importer tools.
…
Meta was found to be in breach of Article 25 of the GDPR. … As well as the fine, Meta has been issued with a reprimand and an order requiring it to bring its processing into compliance. … Helen Dixon … the Data Protection Commissioner said the large fine imposed on Meta is intended to have a deterrent effect. [She] said when products and services are being designed, [they] must be designed to adequately protect a person's data.
…
Ms. Dixon added that the Commission is regulating on behalf of all EU users. … No objections to the drafts were raised [by] other EU data protection authorities.

How much is that in real money? Sam Schechner says — “Irish Regulator Fines Meta on User Privacy”:

“Several dozen more ongoing cases”
265 million euros [is] equivalent to about $276 million. [It] is the latest indication of how authorities in the [EU] are becoming more aggressive in applying the bloc’s privacy law to large technology companies. [This] is the third time Ireland has fined Meta … in a privacy case over the past 15 months, bringing the combined financial penalties to the equivalent of more than $900 million.
…
[The] fine stems from disclosures in the spring of 2021 that [the] information of more than 530 million Facebook users [leaked] from mass “scraping” of public profiles. … Ireland’s Data Protection Commission … said the company hadn’t taken sufficient technical and organizational steps to prevent such a leak.
…
GDPR has been enforced for nearly five years but is only now generating a series of decisions with big fines. [The] regulator says it has several dozen more ongoing cases involving multiple big tech companies [including] Meta.

How has Meta’s DevSecOps changed as a result? Mike Clark penned this 18 months ago — “How We Combat Scraping”:

“Identifying and deterring scraping”
We’d like to explain … what we’re doing to prevent scraping to protect people’s information. … Using automation to get data from Facebook without our permission is a violation of our terms. … Scrapers may not access or collect data from our products using automated means.
…
[But] it can be difficult to detect them. We do however, have a number of methods to distinguish unauthorized, automated activity. … The first way we aim to make scraping more difficult is through the use of rate limits and data limits.
…
[But] we know that scrapers are determined to find new ways to get data. That’s why we’ve also focused on developing other methods of identifying and deterring scraping. We won’t go into all of them because we don’t want to give a roadmap to scrapers.

Oh! That quickly turned into a whole lot of nothing. Still, at least they’re doing something — even if they won’t say what. But this Anonymous Coward isn’t impressed:

While a watchdog can fine and scold, nobody knows how to "un-leak" data. Since most of us only have one … real identity, one leak is all it takes.

Exactly! What can you do? One of the best resources is JonasCz’s. Here’s a tiny flavor:

“Unfortunately this is hard”
Monitor your logs & traffic patterns. Limit access if you see … unusual activity, such as many similar requests from a specific IP address, someone looking at an excessive number of pages or performing an unusual number of searches.
…
Limit access to your website (or show a captcha) for requests originating from the IP addresses used by … services such as Amazon Web Services or Google app Engine … proxy or VPN providers. … Don't just do it on a per-IP address basis; you can use other indicators and methods: … How fast users fill out forms, and where on a button they click; … gather a lot of information with JavaScript, such as screen size / resolution, timezone, installed fonts, etc; … HTTP headers and their order, especially User-Agent. … Use and require cookies. … If it doesn't request assets (CSS, images), it's not a real browser.
…
Obfuscate your endpoints and make them hard for others to use. … Don't expose any APIs … unintentionally. … Don't forget your mobile site and apps. … If feasible, don't provide a way … to get all of your dataset.
…
Slow down scrapers and make them ineffective. You could also show a captcha if actions are completed too fast or faster than a real user would. … Screw with the scraper: Insert fake, invisible honeypot data. … Unfortunately this is hard, and you will need to make trade-offs between preventing scraping and degrading the accessibility for real users and search engines. … Show a friendly error message that doesn't tell the scraper what caused it. Something like:
…
Sorry, something went wrong. You can contact support via helpdesk@example.com.

Other suggestions include these, by SyneRyder:

If you haven't already, try adding some "trap streets" to your data. Map makers occasionally include streets that don't exist, so if a competitors map includes it too, it's clear that the competitor copied it.
…
I did that with an online marketing dictionary I wrote years ago, some of the definitions included strange usage examples that contained the names of several of my friends. When a competitor scraped us, instead of shutting them down, the boss negotiated a data licensing arrangement with the scraper instead, so we ended up getting a revenue stream and backlinks out of the incident.
…
The DMCA is often effective. I've made DMCA requests against websites that distributed cracks of my software and they often disappeared in a couple of days.

But nicolaiplum is amazed we’re even talking about this:

The amazing thing about this is that the Irish Data Protection Commission did anything at all. The second-most attractive thing about Ireland as a place to put your EU subsidiary of a US corporation is its incredibly ineffective and supine regulator (the most attractive thing is the low corporate tax rate).

There have been a lot of rumours that data protection regulators in parts of the EU that are more effective, like Germany and Netherlands, told the Irish DPC that if the Irish did not act, the Germans and Dutch would start their own enforcement actions, and that this finally prodded the Irish DPC into doing something.

How bad is that fine, really? At the time, it was said the leak covered “more than 533 million users.” Nitmare64 does the math:

52 cents per person affected. LOL, no wonder these companies keep doing this.

Meanwhile, Dudezila has an inquiring mind:

Serious question: Who gets the money and what do they do with it?

And Finally:

I promise not to subject you to Mariah this year

Previously in And finally


You have been reading Secure Software Blogwatch by Richi Jennings. Richi curates the best bloggy bits, finest forums, and weirdest websites … so you don’t have to. Hate mail may be directed to @RiCHi or ssbw@richi.uk. Ask your doctor before reading. Your mileage may vary. Past performance is no guarantee of future results. Do not stare into laser with remaining eye. E&OE. 30.

Image sauce: Stuart Isett (cc:by-nc-nd; leveled and cropped)

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Dev & DevSecOpsSecure Software Blogwatch

More Blog Posts

MCP security robot

Lab offers 9 ways to improve MCP security

The Vulnerable MCP Servers Lab delivers integration training, demos, and instruction on attack methods.

Learn More about Lab offers 9 ways to improve MCP security
Lab offers 9 ways to improve MCP security
AI coding new life for Rust

How AI coding is breathing new life into Rust 

AI tools are making Rust a favorite language of developers — even those maintaining codebases like Microsoft’s.

Learn More about How AI coding is breathing new life into Rust 
How AI coding is breathing new life into Rust 
Open-source software (OSS)

Anthropic’s PSF investment: Why it matters

Here’s what the $1.5M investment in the Python Software Foundation will mean for AI coding and open-source security.

Learn More about Anthropic’s PSF investment: Why it matters
Anthropic’s PSF investment: Why it matters
Software quality crisis

Software quality's decline: How AI accelerates it

Development is in freefall toward software entropy and insecurity. Can spec-driven development help?

Learn More about Software quality's decline: How AI accelerates it
Software quality's decline: How AI accelerates it

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top