Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram

Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram

Posted on June 9, 2025June 9, 2025 By CWS

A complicated monitoring technique employed by Meta (Fb) and Yandex that probably affected billions of Android customers via covert web-to-app communications by way of localhost sockets. 

The method allowed native Android apps, together with Fb and Instagram, to silently obtain browser metadata, cookies, and instructions from Meta Pixel scripts embedded on 1000’s of internet sites, successfully linking cellular looking classes to consumer identities and bypassing commonplace privateness protections.

Implementation Through WebRTC and Port Manipulation

GitHub stories that the monitoring mechanism exploited Android’s unrestricted entry to localhost sockets, with Meta’s method evolving via a number of technical iterations. 

Initially utilizing HTTP requests in September 2024, Meta’s system progressed to WebSocket communications earlier than selecting WebRTC STUN with SDP Munging by November 2024. 

The Meta Pixel JavaScript transmitted the first-party _fbp cookie utilizing WebRTC to UDP ports 12580–12585, the place Fb and Instagram apps maintained persistent listeners.

The technical implementation concerned SDP Munging, the place Meta inserted the _fbp cookie contents into the SDP “ice-ufrag” area, producing Binding Request STUN messages despatched to the loopback deal with 127.0.0.1. 

This information circulate remained invisible to straightforward browser debugging instruments like Chrome’s DevTools, making detection difficult for customers and safety researchers. 

By Might 2025, Meta launched WebRTC TURN communications to ports 12586-12591, avoiding SDP Munging after Chrome builders introduced plans to disable the method.

The monitoring technique demonstrated unprecedented scope, with Meta Pixel embedded on over 5.8 million web sites based on BuiltWith, making the _fbp cookie the third most typical first-party cookie throughout the net. 

Analysis crawls of the highest 100,000 web sites revealed Meta Pixel trying localhost communications on 17,223 websites within the US and 15,677 websites within the EU, with roughly 75-78% of those websites triggering the habits with out express consumer consent.

The system successfully circumvented established privateness protections, together with cookie clearing, Incognito Mode, and Android’s permission controls. 

Even customers not logged into Fb or Instagram on their cellular browsers remained susceptible to monitoring via the Android Promoting ID (AAID) bridging mechanism. 

The tactic labored by linking ephemeral net identifiers to persistent cellular app IDs, permitting Meta to affiliate completely different _fbp cookies throughout web sites with the identical consumer account.

Mitigation Efforts

Following accountable disclosure to main browser distributors, a number of countermeasures entered growth and deployment. 

Chrome model 137, launched Might 26, 2025, carried out protections blocking abused ports and disabling the precise SDP munging methods utilized by Meta Pixel. 

Firefox model 139 included related port-blocking countermeasures, whereas DuckDuckGo and Courageous browsers already maintained blocklist-based protections in opposition to localhost communications.

Considerably, Meta discontinued the follow round June 3, 2025, with the Fb Pixel script not sending packets to localhost and the accountable code being virtually fully eliminated. Yandex equally ceased its localhost-based monitoring operations following the disclosure. 

The revelation prompted broader discussions about platform sandboxing limitations and the necessity for enhanced Android interprocess communication safety, notably concerning localhost connections that allow cross-application information sharing with out consumer consciousness or consent.

Searching for AI-Powered Nex-Gen malware safety? – Obtain Malware Safety Plus for Free

Cyber Security News Tags:Android, Covertly, Facebook, Instagram, Meta, track, Users

Post navigation

Previous Post: Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
Next Post: Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

Related Posts

Critical XSS Flaws in Foxit PDF Editor Expose Users to Risk Critical XSS Flaws in Foxit PDF Editor Expose Users to Risk Cyber Security News
ESET Warns AI-driven Malware Attack and Rapidly Growing Ransomware Economy ESET Warns AI-driven Malware Attack and Rapidly Growing Ransomware Economy Cyber Security News
Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web Cyber Security News
706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online 706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online Cyber Security News
Cloudflare Outage Traced to Emergency React2Shell Patch Deployment Cloudflare Outage Traced to Emergency React2Shell Patch Deployment Cyber Security News
CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News