Know Thy Enemy: The Taxonomies That Meta Uses to Map the Offensive Privacy Space
This talk introduces two new internal taxonomies developed by Meta's Privacy Red Team: the Privacy Adversarial Framework (PAF) and the Meta Weakness Enumeration (MWE). These frameworks are designed to track privacy-specific threats and vulnerabilities, bridging the gap between traditional security incident management and privacy-centric risk assessment. The presentation demonstrates how these taxonomies enable organizations to identify systemic privacy issues, prioritize defensive investments, and improve cross-team collaboration. The frameworks are released as open-source tools to help the broader community map and mitigate privacy-focused adversarial behaviors.
Mapping Privacy Risks: Why Your Threat Model Needs a Privacy-Specific Taxonomy
TLDR: Meta’s Privacy Red Team has released two new open-source taxonomies, the Privacy Adversarial Framework (PAF) and the Meta Weakness Enumeration (MWE), to help researchers track privacy-specific threats. These frameworks move beyond traditional security bug tracking by focusing on how adversaries exploit data access, anonymization failures, and contact point exposure. Pentesters and bug bounty hunters can use these tools to identify systemic privacy risks that standard vulnerability scanners often miss.
Security researchers often treat privacy as a secondary concern, assuming that if the infrastructure is secure, the data is safe. This assumption is a massive blind spot. An adversary does not need to compromise a server to cause a privacy breach; they only need to abuse legitimate functionality to extract sensitive user data. Meta’s recent research highlights that privacy threats are often distinct from traditional security vulnerabilities, requiring a different approach to mapping and mitigation.
Beyond the Kill Chain: The Privacy Adversarial Framework
Traditional security frameworks like MITRE ATT&CK are excellent for mapping how an attacker gains persistence or moves laterally. However, they fall short when the goal is data exfiltration via legitimate API usage. A stalker or a data broker does not need to drop a shell or escalate privileges. They simply need to scrape data or deanonymize users.
The Privacy Adversarial Framework (PAF) is designed to fill this gap. It is a TTP-based framework that ignores the traditional "kill chain" because privacy threats are often opportunistic rather than sequential. An adversary might simply query a legacy endpoint or use a side-channel to infer information. PAF allows researchers to tag these behaviors, making it easier to track how often specific privacy-centric tactics appear across different product surfaces.
For a pentester, this means you can now categorize findings that were previously difficult to classify. If you find an endpoint that leaks user contact information via an account recovery flow, you are no longer forced to shoehorn it into a generic Broken Access Control category. You can map it to specific privacy vectors, allowing you to demonstrate the systemic nature of the issue to stakeholders who might otherwise dismiss it as a "low-impact" bug.
Meta Weakness Enumeration: Categorizing the Root Cause
While PAF tracks the "how," the Meta Weakness Enumeration (MWE) tracks the "why." It functions similarly to CWE but is specifically tuned for privacy. The core challenge with privacy vulnerabilities is that they are often rooted in design decisions rather than implementation bugs.
Consider the issue of contact point exposure. An adversary might use an account recovery flow to verify if a specific phone number is associated with an account. This is a classic Identification and Authentication Failure. MWE allows you to link this vector to the root weakness: a response side-channel that leaks account existence. By categorizing these weaknesses, you can identify patterns. If you see the same MWE category popping up across multiple services, you have found a systemic architectural flaw that requires a platform-wide fix rather than a series of one-off patches.
Integrating Privacy into Your Testing Workflow
If you are a bug bounty hunter, these frameworks provide a structured way to write reports that resonate with security teams. Instead of just reporting a single bug, you can use the PAF and MWE taxonomies to show how your finding fits into a broader class of privacy risks. This adds significant value to your report, as it helps the triage team understand the systemic risk to the platform.
For those working on internal red teams, the integration with MITRE ATT&CK Navigator is the real game-changer. You can visualize your coverage of privacy threats just as you do for security threats. This allows you to identify gaps in your testing. If your heat map shows zero coverage for "Insufficient Anonymization" or "Contact Point Exposure," you know exactly where to focus your next engagement.
Defensive Investment and Systemic Remediation
Defenders often struggle to justify the cost of fixing privacy issues because they lack the data to prove the risk is systemic. By using these taxonomies, you can aggregate findings to show leadership that a specific class of privacy weakness is a recurring theme. This data-driven approach is the only way to move from reactive patching to proactive design changes.
When you start tracking these issues, you will likely find that the same privacy-centric vulnerabilities appear across different teams and products. This is the moment to stop playing whack-a-mole. Use the data to push for platform-level controls, such as rate-limiting sensitive API endpoints or implementing stricter data access policies.
Privacy is not just a legal or compliance checkbox. It is a technical discipline that requires the same rigor as offensive security. By adopting these taxonomies, you are not just finding more bugs; you are building a more resilient architecture that protects user data by default. Start by mapping your current findings against these frameworks and see where the gaps in your own threat model lie. The data will likely surprise you.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference

Chained to Hit: Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software

Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones

ODDFuzz: Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Anyone Can Hack IoT: A Beginner's Guide to Hacking Your First IoT Device

