{"id":38858,"date":"2021-03-01T07:14:53","date_gmt":"2021-03-01T12:14:53","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=38858"},"modified":"2021-09-24T07:46:35","modified_gmt":"2021-09-24T11:46:35","slug":"suspicious-login-attempt-facebook-instagram","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/suspicious-login-attempt-facebook-instagram\/38858\/","title":{"rendered":"Who&#8217;s in your Facebook and Instagram accounts?"},"content":{"rendered":"<p>A notification pops up on your smartphone screen: \u201cWe detected an unusual login attempt from Rio de Janeiro, Brazil.\u201d Whether the login attempt occurs where you live, halfway around the world, on the kind of phone you use, or from a device you\u2019ve never heard of, what\u2019s really going on here is an attempt to make you panic. Don\u2019t panic.<\/p>\n<p>Either someone\u2019s been busted trying to log in to your account or not, and freaking out will not help. To help you remain calm and survive the incident with minimal losses, we are arming you with knowledge of what it might be and what to do.<\/p>\n<h2>What it might be<\/h2>\n<p>To begin with, let\u2019s figure out how an outsider could have gained access to your account in the first place. It can happen in one of several ways.<\/p>\n<h3>Data leak and credential stuffing<\/h3>\n<p>Data leaks and breaches pop up in the news quite often, and even if Facebook and Instagram weren\u2019t hit directly, if another website is breached and the compromised data included your account info, then cybercriminals possess your credentials. Using a list of e-mail usernames and passwords, they can carry out a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/credential-stuffing\/\" target=\"_blank\" rel=\"noopener\">credential-stuffing attack<\/a> \u2014 that is, they enter the stolen credentials on other sites. That works because people use the <a href=\"https:\/\/www.kaspersky.com\/blog\/never-reuse-passwords-story\/24808\/\" target=\"_blank\" rel=\"noopener nofollow\">same password for multiple accounts<\/a>, an unforced but extremely common error.<\/p>\n<p>Alternatively, your Facebook or Instagram credentials might have leaked from an associated app. For example, in June of last year, SocialCaptain, a service for growing Instagram following through automation, leaked <a href=\"https:\/\/www.thesun.co.uk\/tech\/10863583\/social-captain-instagram-password-leak-online-how-to\/\" target=\"_blank\" rel=\"nofollow noopener\">thousands of Instagram account passwords<\/a>. The service didn\u2019t encrypt client data, as it turned out. It is reasonable to assume that many SocialCaptain users have since encountered hacking attempts.<\/p>\n<h3>Phishing<\/h3>\n<p>You could be looking at the results of a phishing scam, that your username and password landed in the hands of scammers. It happens. Maybe you clicked on a link and entered your credentials on a convincing fake Facebook or Instagram login screen. For example, just recently, our experts uncovered a phishing campaign that <a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-account-hijack-through-notes\/38571\/\" target=\"_blank\" rel=\"noopener nofollow\">lured victims to fake login pages<\/a> by threatening to block their Facebook account for copyright infringement.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n<h3>Password theft<\/h3>\n<p>Malware can also steal credentials. For example, many Trojans come with a built-in <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/keylogger-glossary\/\" target=\"_blank\" rel=\"noopener\">keylogger<\/a>, a program that, as the name suggests, logs keystrokes on the keyboard. If you picked up malware that logs keystrokes, then cybercriminals have every username and password you\u2019ve entered since.<\/p>\n<h3>Access token theft<\/h3>\n<p>Perhaps someone stole your access token. To avoid having to enter your password every time you sign in to Facebook or Instagram, the app saves a small piece of login information on your computer, known as an access token, or token for short. If a cybercriminal steals a valid token, they can access the account without a username and password.<\/p>\n<p>Tokens have been stolen through vulnerabilities in Facebook \u2014 for example, in 2018, attackers <a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-token-breach\/24052\/\" target=\"_blank\" rel=\"noopener nofollow\">got hold of access tokens for 50 million Facebook accounts<\/a>. Tokens can also be <a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-messenger-malware\/18412\/\" target=\"_blank\" rel=\"noopener nofollow\">stolen through browser extensions<\/a>.<\/p>\n<h3>Login from another device<\/h3>\n<p>Nor is it inconceivable that you logged in to Facebook or Instagram from someone else\u2019s device \u2014 at a party, in an Internet caf\u00e9, in a hotel lobby \u2014 and did not log out afterwards. Or, for example, if you forget to sign out of your account on a device you later sell or give away, you may be giving someone else access to your account.<\/p>\n<h3>False alarm (phishing again)<\/h3>\n<p>Perhaps your account was not hacked at all. It\u2019s also possible someone is trying to do precisely that, using a fake notification about a suspicious login attempt. That is phishing, as discussed above, but a slightly different variation. Instead of threatening to block your account, cybercriminals can use a fake login attempt notification with a link to a phishing site similar to the real login page. The hope is that the panic-stricken victim will go to the fake site and enter their credentials there.<\/p>\n<h2>What to do<\/h2>\n<p>Now that you know the possible causes, it is time to act.<\/p>\n<p>First, log in to your account \u2014 but definitely not through the link in the notification (as we already know, it might point to a phishing site). Use the social network\u2019s mobile app or manually enter the address in your browser. If the password does not work and you are locked out, refer to our <a href=\"https:\/\/www.kaspersky.com\/blog\/tips-for-hacked-account\/36760\/\" target=\"_blank\" rel=\"noopener nofollow\">detailed guide on what to do if your account has already been hijacked<\/a>.<\/p>\n<p>If you were able to log in, go to your account settings and check the authenticity of the notification. Each social network has its own interface; here\u2019s how <a href=\"https:\/\/www.facebook.com\/help\/fblite\/1956527391029758?helpref=faq_content\" target=\"_blank\" rel=\"nofollow noopener\">Facebook<\/a> and <a href=\"https:\/\/www.facebook.com\/help\/instagram\/760602221058803?helpref=related\" target=\"_blank\" rel=\"nofollow noopener\">Instagram<\/a> manage messages.<\/p>\n<p>Then, proceed to <em>Account logins<\/em>. If you see no suspicious entries, then the message was just phishing; delete and move on.<\/p>\n<p>If you do see something suspicious in the list of account logins, take action immediately to mitigate the damage:<\/p>\n<ul>\n<li>Immediately sign out of your account on all devices. On Instagram, you will have to end each session manually in the <em>Account logins<\/em> menu. Facebook can do it with a single click or tap under <em>Security and Login<\/em> in the settings. Your session on the current device will remain active.<\/li>\n<li>Confirm your phone number and e-mail address in the account settings; attackers can change those details to receive links or codes for changing account passwords. If they did, change them back.<\/li>\n<li>Set a new password, and make it one that is strong and that you don\u2019t use anywhere else. If you are worried about keeping track, save your passwords in a <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a>, which can also help you come up with a strong combination.<\/li>\n<li>Enable two-factor authentication to make hacking into your accounts harder for cybercriminals, even if they get your password.<\/li>\n<li>Scan all of your devices with a <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">reliable antivirus<\/a> to ensure they are free of malware.<\/li>\n<\/ul>\n<p>Attention to security settings combined with good protection software will turn your account into a fortress.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n","protected":false},"excerpt":{"rendered":"<p>What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.<\/p>\n","protected":false},"author":2581,"featured_media":38859,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[20,82,765,4230,187,76,97,211,131],"class_list":{"0":"post-38858","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-facebook","9":"tag-hacking","10":"tag-instagram","11":"tag-international-day-for-universal-access-to-information","12":"tag-passwords","13":"tag-phishing","14":"tag-security-2","15":"tag-social-media","16":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/suspicious-login-attempt-facebook-instagram\/38858\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/suspicious-login-attempt-facebook-instagram\/22553\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/suspicious-login-attempt-facebook-instagram\/18048\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/suspicious-login-attempt-facebook-instagram\/24271\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/suspicious-login-attempt-facebook-instagram\/22340\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/suspicious-login-attempt-facebook-instagram\/21151\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/suspicious-login-attempt-facebook-instagram\/24803\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/suspicious-login-attempt-facebook-instagram\/24012\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/suspicious-login-attempt-facebook-instagram\/30181\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/suspicious-login-attempt-facebook-instagram\/9386\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/suspicious-login-attempt-facebook-instagram\/16465\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/suspicious-login-attempt-facebook-instagram\/17055\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/suspicious-login-attempt-facebook-instagram\/14524\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/suspicious-login-attempt-facebook-instagram\/26285\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/suspicious-login-attempt-facebook-instagram\/30115\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/suspicious-login-attempt-facebook-instagram\/26743\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/suspicious-login-attempt-facebook-instagram\/23603\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/suspicious-login-attempt-facebook-instagram\/28932\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/suspicious-login-attempt-facebook-instagram\/28740\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=38858"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38858\/revisions"}],"predecessor-version":[{"id":38862,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38858\/revisions\/38862"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/38859"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=38858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=38858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=38858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}