What to Do If Your Facebook, Instagram, or Email Account Is Hacked
Act quickly and follow these steps to recover a hacked social media or email account — and prevent it from happening again.
Try to regain access immediately
~35sQuick Tip
Quick Tip: If the hacker changed your password and email, try Facebook's or Instagram's identity verification process — you may be asked to verify your identity with a photo ID to reclaim your account.
Change your password immediately after regaining access
~36sWarning
If you use the same password on multiple sites and one site is breached, hackers will automatically try that password everywhere. Each account should have a unique password — this is the single biggest step you can take for online security.
Turn on two-factor authentication
~24sCheck and remove unfamiliar devices and apps
~36sQuick Tip
Quick Tip: Report the hack to the platform using their official "Report a hacked account" tool. This creates a record and can help with future recovery if needed.
You Did It!
You've completed: What to Do If Your Facebook, Instagram, or Email Account Is Hacked
Need more help? Get Expert Help from a TekSure Tech
Having a social media or email account hacked is alarming and stressful. Hackers may use your account to send spam, scam your contacts, post inappropriate content, or steal personal information. The faster you act, the better the chance of recovering your account and limiting the damage.
Common signs your account was hacked: you receive a login notification from an unfamiliar location or device, friends tell you they received strange messages from you, you are locked out of your account, your profile picture or personal information changed without your action, or you see posts or messages you did not send.
This guide covers recovery steps for the most common platforms — Facebook, Instagram, and email — as well as steps to prevent future hacking.
Rate this guide
How helpful was this guide?
Official Resources
Sources used to create and verify this guide. View all sources →
← Previous
How to Use Google One to Manage Your Storage
Next →
How to Use Alexa to Create Shopping Lists and Order on Amazon
Still stuck? Let a pro handle it.
Our verified technicians can fix this issue for you — remotely or in person.
Related Guides
How to Secure Your Home Wi-Fi Network
Simple steps to lock down your home router, keep strangers off your network, and protect every device in your house.
3 min read
Setting Up Two-Factor Authentication (2FA) on Any Account
Add a second layer of security to your most important accounts. This one change stops most account takeovers cold.
3 min read
Staying Safe on Social Media
How to protect your privacy on Facebook and Instagram, spot fake accounts, and avoid the most common social media traps.
3 min read