Hacked.com icon

hacked.com

How to Recover a Hacked Instagram Account

Person checking official Instagram account-recovery steps on a phone after an account takeover

A hacked Instagram account is usually recoverable when you stop the attacker from using the same reset channels you are using. The account matters, but the real control points are the email inbox, phone number, saved sessions, and the device you use for recovery. If one of those is still under the attacker's control, recovery turns into a loop.

Most Instagram takeovers start with password reuse, phishing, or stolen sessions from a compromised phone or browser. The order matters: contain access first, then recover, then harden.

Start with the branch you are actually in

What is true right now Start here Why it matters
You can still open Instagram on at least one trusted device Change the password, lock down the email inbox, sign out unknown sessions, then review linked accounts and suspicious app access. Attackers usually keep a second way back in. If you only change the password, they often return through email, saved sessions, or an added connection.
You received an email saying your Instagram email address changed Open the message from security@mail.instagram.com and try the official reversal link first. This is the fastest path when the attacker changed the email but you still have the warning message.
You are locked out and codes are not reaching you Use Instagram's official hacked-account flow, then continue to the support path and give a secure email address that only you control. Repeated password resets do not help if the attacker already changed the recovery channels.
You recovered the account once, but the attacker got back in Assume the email inbox, phone, device, linked accounts, or a suspicious app is still exposed. Repeat takeovers almost always mean one of the real control points was left untouched.

Safety note: Instagram says account-security help does not come through Direct Message. If someone contacts you first and asks for codes, payment, ID, or remote access, treat it as a scam.

If you can still get in: stabilize access before the attacker does

1) Change the password from a clean device

Use a device you trust, not the one that may have been tricked by a fake login page or a malicious browser extension. Set a unique password that you do not use anywhere else. If this password was reused, change the same password everywhere else starting with email.

2) Secure the email inbox and phone number tied to Instagram

Your inbox is the reset button for the account. Change the email password, review recent sign-ins, remove unknown forwarding rules or filters, and make sure the recovery email and recovery phone on the inbox are yours. Then confirm that the email address and phone number on the Instagram account still belong to you.

3) End unknown sessions and remove secondary access paths

Sign out of devices and sessions you do not recognize. Then review Accounts Center for linked accounts you did not add and remove anything suspicious. Check for connected apps you do not trust and revoke them. Meta's current hacked-account guidance explicitly includes reviewing linked accounts and removing suspicious connected apps.

4) Turn on stronger sign-in protection

Enable two-factor authentication (2FA) using the strongest method Instagram offers you, preferably an authenticator app rather than SMS alone. This matters even more if the attacker already knew your password, because it changes the next barrier they have to cross.

5) Verify what Instagram really sent you

Meta currently points users to Accounts Center, then Password and security, then Recent emails to review legitimate messages from Instagram from the last 14 days. Use that page before you trust an email or act on a warning. It is one of the safest ways to tell a real security message from a fake one.

Rule of thumb: if settings keep changing back after you fix them, stop assuming the Instagram password is the only problem. The email inbox, device, or another attached access path is still exposed.

If the attacker changed your email address

Meta's official recovery guidance still says to look for the warning email from security@mail.instagram.com. If the message says your email address changed, you may be able to reverse the change directly from the official link in that email.

If the attacker changed more than just the email address, or the reversal link no longer works, move to Instagram's official hacked-account flow: If you think your Instagram account has been hacked. Meta also keeps a separate help page for email-change incidents here: Instagram email address changes.

Avoid running reset after reset from multiple devices. If emails are not arriving, pause and check the inbox itself: spam, archive, forwarding rules, blocked senders, and whether the mailbox is still signed in somewhere you do not recognize. Recovery usually fails here because the inbox is compromised, not because the Instagram form is broken.

If you cannot receive codes: move to support, not more resets

Labels and menus can vary by device and region, but the official flow is stable. Start from the Instagram login screen, use the password-help path, enter the username, email address, or phone number tied to the account, and continue to the support branch when login links or security codes are going to the attacker instead of you.

Use a secure contact email that only you control

When Instagram asks where to contact you, give a clean email address that only you can access. Do not use an inbox you suspect is compromised. This is where Instagram sends follow-up recovery steps, and using the wrong inbox can hand the case back to the attacker.

What Instagram may ask next

If the account includes photos of you, Meta says you may be asked to complete video selfie verification. Their identity-help documentation says this can involve turning your head in different directions so Instagram can check that you are a real person and match you to the account. Meta also says review can take up to two business days.

If the account does not include photos of you, Instagram may ask for different proof. Meta's current help text says that in some cases it asks for details such as the original email address or phone number used to sign up, plus the type of device used when the account was created. In identity-check scenarios, Meta's official documentation says any document you submit must show your full name and recent photo, and you should only submit the documents that were specifically requested: Types of ID that Instagram accepts.

Common mistake: jumping between reset links, old devices, and multiple inboxes at the same time can push you into the wrong branch. Pick one clean device, one secure inbox, and one official flow.

How to tell real Instagram messages from fake ones

Meta's password-reset guidance says password reset emails come from @mail.instagram.com. Email-change warnings can come from security@mail.instagram.com. Those details help, but they are still not enough by themselves because scammers can imitate formatting and pressure.

The safer method is to confirm the message inside Instagram's own Recent emails view in Accounts Center and to ignore anyone who claims they can "expedite" recovery if you send a code, selfie, or payment. Meta's current help also says Instagram will not reach out to you about account security through Direct Message. Use the official recent-email guidance here: Review recent emails from Instagram. Meta's password-reset page is here: Why you received an Instagram password reset email you did not request.

If the attacker is using the account right now

If scam posts, fake marketplace offers, or direct messages are still going out, focus on harm reduction while you work recovery. Tell friends, family, customers, or recent buyers not to trust new payment requests, reset requests, or urgent messages from the account. A short warning to the people most likely to respond is usually more useful than a public argument with the attacker.

Take screenshots of obvious evidence while it is still visible: changed profile details, scam posts, linked accounts you do not recognize, and any email warnings from Instagram. This helps if the case turns into a disabled-account appeal or if you later need to explain exactly what happened to contacts, buyers, or support.

Do not negotiate with so-called recovery specialists, pay anyone claiming insider access, or keep chatting with the attacker inside the account. The correct order is still the same: secure the inbox, use the official recovery path, remove access routes, then clean up the visible damage once the account is back under your control.

When recovery keeps failing

The inbox is still compromised

If the attacker still has access to the email account, they can intercept recovery links, undo your changes, or add their own recovery methods again. Treat email security as a prerequisite, not a follow-up task.

The phone or browser is compromised

If the takeover started after a fake verification page, a cracked app, a suspicious browser extension, or a strange "support" install, assume device compromise. Read infostealer malware for the common pattern. Do not keep entering fresh credentials on a device you do not trust.

Repeated prompts to log in again, fresh password failures from one device only, or settings that keep changing after you "fix" them can all point to a browser or phone problem rather than an Instagram-only problem. Switch to a clean device for recovery before you keep feeding new credentials into the same environment.

Another access path is still attached

Linked accounts, saved sessions, suspicious connected apps, or a recovery method the attacker added can all let them back in. This is why a password-only fix fails so often. Go back through the containment list and check every attached access path, not just the obvious one.

The account was disabled during the takeover

Some attackers use the account for spam, impersonation, or other policy violations before you get it back. If Instagram disabled the account during the incident, the case turns into both a recovery issue and an appeal issue. Use recover your disabled Instagram account after a hack for the appeal sequence and evidence checklist.

After you get back in: make it stick

Once access is back, work from the recovery channels inward. Fix the inbox, phone, sessions, and connected access first. Then clean up visible profile damage, scam posts, and anything the attacker changed for credibility or monetization.

  • Secure the inbox completely: password, sessions, recovery options, forwarding rules, and mailbox filters.
  • Remove reuse elsewhere: if the Instagram password was reused, rotate the reused accounts starting with email and any financial or identity accounts.
  • Keep strong sign-in protection on both sides: Instagram and the inbox should both use strong two-step protection.
  • Clean the device before you trust it again: update the OS, remove suspicious apps or extensions, and treat persistent re-logins as a device problem until proven otherwise.
  • Save the new recovery state: if Instagram offers backup codes or shows the confirmed email and phone details, store that information somewhere safe after the incident is stable.
  • Warn contacts if needed: if the attacker sent scam DMs or marketplace messages, tell people not to trust recent messages from the account.

For the longer follow-on checklist, use how to secure your Instagram account. If the incident involved odd popups, fake security prompts, or repeated re-entry after password changes, use how to check if your phone is hacked before you treat the case as closed.

Instagram recovery rarely turns on one perfect form. It turns on whether you can remove every path the attacker still controls faster than they can use it. That is why the inbox, phone number, sessions, and device matter more than the drama of the takeover itself.

Once those control points are back in your hands, the job becomes narrower. You are no longer trying to outguess the attacker. You are reducing their options until the account is simply harder to steal back than it is worth.

The durable lesson is simple: protect the inbox, use strong sign-in protection, and distrust urgent recovery messages that arrive through the wrong channel. When those habits are in place, Instagram takeovers stop behaving like chaos and start behaving like contained incidents.