Skip to main content
Hamburger Menu Close


commentary Commentary

Commentary: Facebook hack reveals the perils of using single sign-on login

Single sign-on logins makes authentication simple and convenient, but this method of using one account as an automatic verification to connect to other platforms, has it’s limitation, says one observer.

Commentary: Facebook hack reveals the perils of using single sign-on login

Silhouettes of mobile users are seen next to a screen projection of Facebook logo in this picture illustration taken March 28, 2018. (Photo: REUTERS/Dado Ruvic/File Photo)

PERTH: Facebook announced last Friday (Sep 28) that its engineering team had discovered a security issue affecting almost 50 million accounts. 

Due to a flaw in Facebook’s code, hackers were able to take over an account and use it in the same way you would if you had logged into the account with a password.

The company says it has now fixed the problem in its code and reset access tokens for those accounts – along with 40 million other accounts that were vulnerable to the flaw. If you found yourself logged out of your Facebook account last week, it’s likely you were affected.

Beyond that, little is known about the extent of the security breach. In its security update, Facebook said:

Since we’ve only just started our investigation, we have yet to determine whether these accounts were misused or any information accessed. We also don’t know who’s behind these attacks or where they’re based.


This is not the worst data breach to date. That accolade belongs to the credit bureau Equifax, which had personal data stolen from the accounts of 147 million people. But, unfortunately for Facebook, there are several flow-on effects from the recent hack.

READ: Assume all organisations will be hit by cyberattacks at some point, a commentary

READ: The SingHealth breach and the uphill task of governing cyberspace, a commentary

The logo and trading information for Credit reporting company Equifax Inc. are displayed on a screen on the floor of the New York Stock Exchange (NYSE)

First, the breach may run afoul of the European Union’s General Data Protection Regulation (GDPR), which was introduced in May. Although the GDPR only applies to European citizens, the penalties for data breaches are severe – up to 4 per cent of global turnover per breach.

READ: GDPR, and what those 'updates to our privacy policy' mean for Singapore, a commentary

Second, any accounts on other platforms that use Facebook verification are also at risk. 

That’s because it’s now a common practice to use one account as an automatic verification to connect to other platforms, for example by using a Facebook account to log in to another social media platform such as Twitter, Spotify or Instagram. This is known as single sign-on (SSO).

If you connect to any system, you need some form of authentication – usually a login credential such as a username and password pair. When you have many different systems that all require credentials before you can use them, suddenly you’re faced with remembering ten different (ideally very long) passwords.

Some people can do this, but many can’t. And we still want the systems to be secure. If we could connect to one system that was trusted by the others, and use the trusted system’s password, then we wouldn’t need ten passwords – just one. That’s the principle behind SSO.

READ: The four deadly cybersecurity sins most of us are guilty of, a commentary

The word 'password' is pictured on a computer screen in this picture illustration taken in Berlin May 21, 2013. (Photo: REUTERS/Pawel Kopczynski/Files)

But this only works as long as the trusted system is secure. If it’s not, a cybercriminal could use the hacked account on one platform (in this case, Facebook), to access any other connected platform.


Authentication usually works because of one of three factors: Something you know, such as a password; something you have, such as an access card; and something you are, such as a fingerprint.

Clearly, using more than one factor increases security. In your Facebook account, you can choose to use two-factor authentication. That means that you would need to enter your password plus a code sent to you via an SMS message when you next log in.


There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, and they also want the same systems to be easily accessible. SSO is an attempt to balance usability and security, but the Facebook hack reveals its limitations.

Many people don’t like passwords, so they choose easily remembered, and therefore easily breakable, passwords. Cybercriminals have access to lists of millions of common passwords. (Hint: “Gandalf” isn’t as unique as you might think.)

READ: Seven habits of highly secure digital natives, a commentary

Access tokens, such as cards or other physical devices (as used by some banks, for example) are a solution – as long as you don’t lose it. 

It might be that using a unique physical attribute is the best way forward. After all, you always carry your fingerprint, iris or voice with you.

Mike Johnstone is a security researcher, and associate professor in Resilient Systems at Edith Cowan University. This commentary first appeared on The Conversation. Read it here.

Source: CNA/nr(sl)