Hacked.com icon

hacked.com

How To Tell Your Facebook Has Been Hacked

video by hacked.com with william worrall

The fastest way to confirm a Facebook compromise is not to guess based on vibes. It is to look for high-signal evidence: unknown sessions, changed recovery methods, messages you did not send, and business assets you do not recognize.

High-signal indicator What it usually means First action
Unknown devices or sessions The attacker had real access, not just an attempted login Sign out everywhere, rotate password, then re-check sessions
Email or phone number changed Control plane takeover, lockout risk Reverse changes immediately and secure the email inbox
Messages/posts you did not send Your account is being used to scam others Contain first, then warn contacts via a separate channel
New admins, ad accounts, or billing changes Monetization and persistence path Remove unknown roles and payment methods

If you are already locked out, skip detection and start recovery: facebook.com/hacked.

Key idea: most Facebook takeovers persist through sessions and recovery methods, not just a password. A clean response removes those options.

Step 1: Verify any Facebook email is real

Before you react to an alert, verify it. Attackers copy Facebook’s security emails because victims click fast.

If you received a warning like "someone may have accessed your account", use the containment flow here: someone may have accessed your account.

Step 2: Check where you are logged in

Session history is the highest-signal evidence you can access quickly. You are looking for devices, locations, and times that do not match your behavior.

  • Look for devices you do not recognize.
  • Look for logins at times you were not active.
  • Remember that VPNs and travel can change displayed location. Unknown device types and persistent sessions matter more than the city name.

If you find unknown sessions, treat it as compromise even if nothing else looks wrong. Contain first, then investigate.

Step 3: Check the control plane (email, phone, recovery)

A common Facebook takeover pattern is: attacker gains access once, then changes recovery methods so you cannot evict them later. That is why recovery changes are higher signal than a suspicious post.

  • Confirm the email address on the account is yours.
  • Confirm the phone number on the account is yours.
  • Check whether two-factor authentication and login alerts are enabled.

If your primary email was changed, see received Facebook primary email changed. If you received a password change email you did not request, see received Facebook password change.

Step 4: Look for abuse patterns that show real access

Some signs of compromise are obvious. Others are quiet. The quiet ones matter because they persist.

Messages you did not send

Attackers often use Messenger to run scams against friends. If someone says you messaged them, assume your account was used, even if you do not see it in your own inbox.

Posts and shares you did not create

Unfamiliar posts, especially links or "for sale" listings, are common. Delete them after you contain access, not before. If the attacker is still logged in, deleting posts becomes a distraction loop.

New connected apps and integrations

OAuth app grants and connected apps can keep access alive even after a password change. Review connected apps and remove anything you do not recognize.

Business assets and ads

If you manage Pages or have ever run ads, check for new admins, new ad accounts, and billing changes. Attackers like accounts that can spend money.

Common mistake: changing the password and stopping there. If sessions and recovery methods remain compromised, the attacker comes back.

If you confirm compromise: a containment sequence

Use a sequence that reduces attacker options quickly.

  • Rotate the Facebook password to a unique one stored in a password manager.
  • Sign out everywhere and remove unknown devices/sessions.
  • Fix recovery methods (email/phone) and enable login alerts.
  • Remove unknown connected apps and revoke suspicious integrations.
  • Check Pages and ads for unknown admins and billing changes.

If you cannot log in, start with facebook.com/hacked. If you need a longer, end-to-end playbook, use how to recover a hacked Facebook account.

How to interpret common signals (without overreacting)

Not every weird thing is a hack. The job is to separate high-signal indicators from noise.

Signal Often noise Often compromise
Login alert New phone, new browser, VPN, travel Alert plus unknown session or changed recovery method
Friend requests sent Rare Common when account is used for scam expansion
Password reset emails Someone mistyped your email Clusters of attempts, followed by session changes
Messages you did not send Almost never High-signal compromise indicator

What not to do

Account incidents attract scammers who offer "recovery" in comments and DMs. Avoid the common traps.

  • Do not share one-time codes with anyone.
  • Do not install remote access tools because a stranger claims it will fix the account.
  • Do not click email links to "secure" the account. Navigate to official paths directly.

Facebook compromises are rarely solved by one step. They are solved by sequence: verify, contain, remove persistence, then harden.

If you can prove sessions are clean and recovery methods are yours, you have reduced the incident to a closed event instead of an open loop.

The final check is practical: if the attacker tried again tomorrow, what would they use? When the answer is "nothing I have not already removed", you are done.

Build an evidence pack (so you do not chase ghosts)

Before you start changing settings, capture the minimum evidence that helps you reason about what happened and helps support teams later. Do this once, then move on.

  • Screenshot unknown sessions and devices.
  • Screenshot any recovery method changes (email/phone) and security alerts.
  • Screenshot a few examples of messages or posts that were not yours.
  • If ads were run, capture campaign IDs and billing screenshots.

How Facebook accounts usually get taken over

Understanding the entry path matters because it tells you what to fix next. Most takeovers fall into a few buckets.

Entry path What it looks like What to fix
Real-time phishing You entered a password and then a one-time code after following a link Rotate passwords, revoke sessions, and stop sharing codes. Secure the email inbox.
Credential reuse Alerts appear after a breach elsewhere, or logins from unknown devices Move to unique passwords in a password manager and eliminate reuse.
Session theft Account actions happen without a clean login event, or after you "fixed" the password Sign out everywhere, remove unknown devices, review connected apps, and check device/browser hygiene.
Compromised email Password resets and recovery changes appear first in your inbox Secure email first, then recover Facebook. Email is the control plane.

Session theft is especially confusing because it can bypass your mental model of "I changed my password, so I am safe". If you want the concept framing, see session hijacking.

Device and browser checks that reduce re-compromise

If you contained access but alerts continue, assume the attacker still has a path. Often that path is on the device.

  • Update your phone and computer OS, browser, and Facebook app.
  • Remove unknown browser extensions. Extensions are a common source of session and credential theft.
  • Scan for malware if you installed software from an ad, a fake "support" message, or a sketchy download.
  • On shared devices, assume saved passwords and sessions are not private.

If your account was used to scam others

This is where containment meets reputation. Once you have removed attacker access, warn people efficiently:

  • Post a short warning from your recovered account.
  • Message close contacts using a separate channel (text/call) if they were targeted.
  • Report scam posts and remove them after you have captured evidence.

This is not about explaining. It is about reducing secondary victims.

A final checklist that proves you are done

You are not done when you feel calmer. You are done when attacker options are removed.

  • Unknown sessions removed, and sign-out-everywhere completed.
  • Password rotated to a unique one stored in a password manager.
  • Recovery email and phone confirmed as yours.
  • Connected apps and integrations reviewed and cleaned.
  • Pages, ads, and billing reviewed if you have them.

If you can check those boxes, most repeat attacks fail because the attacker cannot regain the same foothold.

That is the durable goal: not "no alerts forever", but a posture where alerts do not become lockouts.

If you cannot log in, avoid the recovery-scam trap

When people lose access, they often click the first "support" result or reply to commenters offering help. That is where many second compromises happen. Use official paths only.

When the attacker is someone you know

Not every Facebook incident is a random criminal campaign. Sometimes it is a partner, roommate, coworker, or family member with device access or a shared password. The technical steps are similar, but the safety planning can be different. If confronting the person could create risk, prioritize personal safety and use a safer device and connection for recovery work.

Facebook compromise feels chaotic because the surface area is large: Messenger, Pages, ads, and the identity link to your email and phone number.

The way to make it small is to focus on the control plane. When your email is secure, recovery methods are yours, and sessions are clean, most attacker tactics collapse.

The remaining work is procedural: avoid link-driven logins, treat one-time codes as secrets, and keep a password manager so reuse is not the weak point.

If you can reduce the incident to a few verifiable facts (unknown session removed, recovery fixed, persistence cleaned), you regain the only thing hacks try to take: control over what happens next.