← All Defender Guides
Online Accounts

How Hackers Hack Facebook Accounts — and How to Protect Yourself

How attackers compromise Facebook accounts and how to lock yours down.

🛡️
Defender's Guide This is a defender-focused resource covering attack patterns at a conceptual level so you can recognise threats and protect yourself or your organisation. The page does not include step-by-step exploitation procedures. If you suspect you are currently being targeted or have been compromised, scroll to the recovery section below.

What attackers want from Facebook Accounts

Facebook accounts are high-value targets because of what they grant access to — private messages with friends and family, photos accumulated over a decade or more, group memberships, marketplace activity, login credentials to other sites that use "Sign in with Facebook", and crucially Facebook Business Manager access for users with business assets. Compromised personal accounts are used for scams against friends; compromised business accounts can result in five and six figure ad-spend losses.

The threat landscape for Facebook overlaps significantly with Instagram (both are Meta) but with some Facebook-specific patterns: heavy focus on Marketplace scams, business account takeover for ad-spending, and exploitation of older accounts with weaker security setups (Facebook accounts predate modern 2FA standards; many long-time users still have weak protections from earlier eras).

For account holders, the right framing is the same as Instagram: assume your password will be in some breach, build defences that work even when your password is compromised. Facebook adds the Business Manager dimension for some users — that requires its own additional protections because of the financial-loss potential.

How attackers actually do it

Conceptual attack categories, not exploitation procedures. Understanding these patterns is what lets you recognise and defend against them.

Credential stuffing from breached passwords

Same pattern as Instagram and most other accounts — attackers test breached credentials from other sites against Facebook. Facebook accounts often predate modern password practices, so reused or weak passwords are common. High-volume background attack against essentially every Facebook user.

Phishing via fake login pages and "account suspended" messages

Common variants include "your account will be deleted for community standards violations", "log in to dispute a copyright claim", "verify your identity to keep your account active". Each leads to a fake login page capturing credentials. Facebook business pages get heavily targeted because the business owner is more likely to fall for "your page will be deleted" urgency.

Session hijacking via malware

Info-stealing malware on victim's device captures Facebook session cookies, allowing attacker login without password. Common via malicious browser extensions, fake software downloads, pirated software bundles. Stolen Facebook sessions are sold in bulk on underground markets.

Business Manager account takeover via employee compromise

Many Facebook business accounts have multiple users with various permission levels. Compromise of any one user with admin access can lead to total account takeover. Once attacker has admin access, they typically add their own user, lock out legitimate admins, and run massive ad campaigns charged to the original owner's payment method.

Marketplace scam-related credential phishing

Facebook Marketplace transactions sometimes lead to phishing — buyer or seller asks the other to verify identity via a "Facebook verification" link that is actually a credential phishing page. The marketplace context makes targets less suspicious of the unusual flow.

Fake "your account has been compromised" support scams

Attackers contact victims claiming to be Facebook support warning of account compromise, then convince victims to "verify" by entering credentials, codes, or installing remote-access software. Older users disproportionately targeted because they may not know what legitimate Facebook support communication looks like.

Cookie theft via malicious browser extensions

Browser extensions with broad permissions can read Facebook cookies and exfiltrate them to attackers. Extensions that promise Facebook-related functionality (analytics, themes, message export) are particularly suspicious; many are deliberately designed for cookie theft.

How to recognise compromise

Signs that your facebook accounts may have been compromised:

Login alerts from unfamiliar locations or devices

Facebook sends notifications when your account logs in from a new device. Receiving these for logins you did not make is the strongest single signal of compromise. Check Facebook Settings → Security → Where You're Logged In to see all current sessions.

Posts, messages, or comments you did not create

Compromised accounts are typically used for spam (cryptocurrency scams, phishing links, fake giveaways), often posted to your timeline or sent as messages to your friends. If your friends mention seeing posts from you that you did not make, the account is compromised.

Email about profile changes you did not make

Facebook emails you when password, email, phone, or recovery options change. Receiving these emails for changes you did not make is strong evidence of compromise. Often the first sign because attackers change recovery options to lock you out.

Friend requests sent or accepted that you did not initiate

Compromised accounts sometimes accept many friend requests automatically (to expand attack surface for scam targeting). Sudden appearance of friends you do not recognise is suspicious.

Cannot log in despite using correct credentials

Password no longer works, you have not changed it. Almost certainly compromise — attacker changed the password. Use Facebook's account recovery flow immediately.

For business accounts: unexpected ad campaigns running

Compromised Facebook Business accounts are typically used for fraudulent ad spend — campaigns you did not create using your payment method. Check Ads Manager regularly; alert on unexpected charges. By the time you notice large unexpected charges, significant money may already be lost.

What actually protects you

Concrete actions ranked by impact. Items marked critical are the highest-leverage protections; do those first.

Use app-based 2FA (not SMS)

In Facebook Settings → Security and Login → Two-Factor Authentication, choose "Authentication App". Avoid SMS-based 2FA — vulnerable to SIM swap. Facebook also supports hardware security keys for the strongest protection. App-based or hardware-key 2FA defeats credential-stuffing attacks even when your password is in a breach.

Use a unique password for Facebook, not reused

Password manager generating a unique strong password for Facebook. Long-time Facebook users are particularly likely to have weak or reused passwords from earlier eras; updating to a unique strong password is high-leverage even if you cannot remember the last time you changed it.

Set up trusted contacts for account recovery

Facebook lets you nominate trusted contacts (3-5 friends) who can help you recover access if locked out. Set this up BEFORE you need it. The recovery experience is significantly faster when trusted contacts are pre-configured.

For business accounts: enforce 2FA across all users

Business Manager admins should enforce 2FA for all users with account access. One employee with weak credentials can compromise the entire business account. Settings → Business Settings → Security Center supports the enforcement.

Audit and revoke connected apps periodically

Settings → Apps and Websites shows everything with Facebook access — old games, abandoned services, third-party logins. Revoke anything you do not actively use. Many older Facebook accounts have dozens of forgotten app connections each representing a potential attack vector.

Review active sessions regularly

Settings → Security and Login → Where You're Logged In shows all current sessions. Log out anything unfamiliar; change password if you find unauthorised sessions.

Be sceptical of any "Facebook support" outreach

Facebook does not contact users via email, message, or call asking for credentials, payment, or to install software. Any such outreach is essentially always a scam. Real account issues are handled through the Facebook help centre and in-app notifications.

For business accounts: separate ad-account payment method limits

Set spending limits on ad accounts so even if compromise occurs, financial damage is bounded. Daily and lifetime spending limits available in Ads Manager. Combined with monitoring, limits convert "catastrophic loss" scenarios into "manageable incident".

Avoid suspicious browser extensions

Extensions promising Facebook-specific functionality (themes, message export, friend management, analytics) are common cookie-theft vectors. Stick to well-established extensions with clear ownership and recent updates. Audit your installed extensions periodically.

Use a unique email for high-value Facebook accounts

For business accounts especially, consider an email address used only for that account. Reduces exposure when other accounts using the same email are breached, and isolates the recovery surface.

Frequently Asked Questions

Strongest signals: login alerts for sessions you did not initiate, posts/messages from your account that you did not create, profile changes (email/phone/password) you did not make, friends reporting suspicious messages from you. If any of these — assume compromise and follow the recovery flow.
Knowing your email alone is not enough. They would also need either your password (via breach or phishing), or successful account-recovery exploitation (which typically requires controlling your email or phone). Email is one identifier; the actual access requires more.
Possible causes: someone is actively trying to access your account (compromise attempt), you logged in from a device the system does not recognise (new browser, VPN giving different location, family member device), or VPN/proxy makes your legitimate logins look like they come from elsewhere. Investigate each — better to be cautious than miss real compromise.
Sometimes yes with sufficient documentation. File a refund request via Meta Business Help Center showing unauthorised access, the timeline of compromise, and the unexpected charges. Documentation matters — login alerts, IP addresses of unauthorised logins, evidence the account was secured after recovery. Meta does refund some fraudulent ad spend, especially when the user can demonstrate they had reasonable security in place that was bypassed.
Six-step checklist: (1) Enable app-based 2FA (not SMS), (2) Set unique strong password via password manager, (3) Set up trusted contacts for recovery, (4) Audit and remove third-party apps you do not use, (5) Review active sessions and log out unfamiliar ones, (6) For business accounts, enforce 2FA across all users and set ad-account spending limits.
Convenience vs. risk tradeoff. Pros: one-tap login, no password to remember per site. Cons: compromise of Facebook compromises all sites using it for login; account-recovery dependency on Facebook; data sharing with third parties. For high-security accounts (banking, medical, government), use direct accounts with strong unique passwords rather than Facebook login. For lower-stakes services, Facebook login is reasonable.
Facebook Messenger has end-to-end encryption available (must be explicitly enabled for "Secret Conversations" or use the Messenger app where E2E may be default). Standard Messenger conversations are encrypted in transit but not E2E — Meta employees can technically access them. For genuinely sensitive communication, use Signal or another E2E-encrypted messenger rather than Facebook.
Account deletion is a significant step (loses access to friends, groups, photos, history). Better intermediate options: lock down the account with strong 2FA, audit privacy settings, remove third-party app access. If you do not actively use Facebook, deactivation (reversible) rather than deletion (irreversible) preserves your ability to recover later.
Do not engage with the messages or click any links. Report the messages to Facebook (right-click → Report Message). Contact your friend through a different channel (call, text, in person) to alert them their account is compromised. Once they recover, the messages will stop.
No — these apps universally do not work as advertised (Facebook does not provide profile-view data via API) and most are designed to steal credentials, harvest data, or post spam from your account. Treat any "see who viewed your profile" offer as a scam and avoid.