Two examples that are top of mind…
They exploited browser vulnerabilities not unlike malware to track users’ behavior across the web: https://www.eff.org/deeplinks/2025/06/protect-yourself-metas...
They bought a “privacy” VPN app and used it to harvest data, then abused Apple’s enterprise app deployments to continue to ship the app after it was banned from the app store: https://en.wikipedia.org/wiki/Onavo
https://arstechnica.com/tech-policy/2025/08/jury-finds-meta-...