Nothing Type in Kotlin

Delete and Modify Facebook Messages Sent to Other Users

Sometimes I receive emails from our readers who needed to know a way to hack Facebook account, however simply to delete a number of their messages they have sent to their friends or colleagues mistakenly or under wrong circumstances like aggression.
How to hack a Facebook account? It's in all probability the most important "n00b" question you'll see on the internet.


The solution for this question is difficult to find — but recently researchers have shown that how you'll modify or alter your messages once you've got pressed the SEND button in Facebook messenger.

What is this vulnerability?

The vulnerability allows a malicious user to change a conversation thread in the Facebook Online Chat & Messenger App. By abusing this vulnerability, it is possible to modify or remove any sent message, photo, file, link, and much more.

The vulnerability was fully disclosed to the Facebook Security team earlier this month. Facebook immediately responded, and after a joint effort, the vulnerability was patched.


What is the potential damage of this vulnerability?

There are a few potential attack vectors abusing this vulnerability. These schemes could have a severe impact on users due to Facebook’s vital role in everyday activities worldwide. Many users rely on Facebook for personal and business related communications, which makes this type of vulnerability very attractive to attackers.
  • Malicious users can manipulate message history as part of fraud campaigns. A malicious actor can change the history of a conversation to claim he had reached a falsified agreement with the victim, or simply change its terms.
  • Hackers can tamper with, alter or hide important information in Facebook chat communications which can have legal repercussions. These chats can be admitted as evidence in legal investigations and this vulnerability opens the door for an attacker to hide evidence of a crime or even incriminate an innocent person.
  • The vulnerability can be used as a malware distribution vehicle. An attacker can change a legitimate link or file into a malicious one, and easily persuade the user to open it. The attacker can use this method later on to update the link to contain the latest C&C address, and keep the phishing scheme up to date.
“By exploiting this vulnerability, cybercriminals could change a whole chat thread without the victim realizing. What’s worse, the hacker could implement automation techniques to continually outsmart security measures for long-term chat alterations,” 
- said Oded Vanunu, Head of Products Vulnerability Research at Check Point. 
“We applaud Facebook for such a rapid response and putting security first for their users.”

Full Technical Analysis

Check Point Security Researcher Roman Zaikin discovered the vulnerability allows hackers to control the Facebook chat and adjust the messages according to his needs, including deleting them and replacing text, links, and files.

Each message in the Facebook chat applications, both online and mobile, has its own identifier “message_id” parameter. An attacker can store this request, containing the identifier, via a proxy while he launches his malicious attempt.

The image below shows a request sent to: www.facebook.com/ajax/mercury/send_message.php

Sending Message

An attacker can reveal the “message_id” by sending the request to: www.facebook.com/ajax/mercury/thread_info.php

Revealing Message IDs

Once the attacker has found the message ID, he can alter the content of the message and send it to the Facebook servers. The content is changed without a push message to the users’ PC or mobile device.

By abusing Facebook chat or Messenger chat, attackers can alter conversations for various purposes. In this section, we will demonstrate a possible attack flow which exploits this vulnerability to distribute ransomware.

First, the attacker sends a legitimate message to a potential target:


The attacker will then alter the message to contain an infected link or file. As you can see in the image below, the message “Hi” changed to “RANSOMWARE COMMAND AND CONTROL ROULETTE”.

Altering The Message


Next, the hacker can manipulate the same attack vector to overcome one of the biggest challenges standing in the face of ransomware today: maintaining an active command & control server. Usually, ransomware campaigns last only several days because the infected links and the C&C addresses become known, and blocked by security vendors, forcing the attacker to shut down his activity and begin again from scratch. However, with this vulnerability, the hacker could implement automation techniques to continually outsmart security measures when the command & control servers are replaced.

GeekOnJava disclosed the vulnerability to Facebook and Facebook took immediate action to patch the vulnerability.



GeekOnJava continues to be on the lookout for vulnerabilities in common software and internet platforms, disclosing issues as they are discovered, alerting, protecting consumers and customers against tomorrow’s threats.

Comments