In 2021, 37 percent of users were victims of social media hacking. That’s in the United States alone. Facebook alone constituted 77 percent of these hacking incidents. The next most-hacked social media platform was Instagram, constituting 35 percent of these breaches.
Facebook remains one of the most-hacked social media platforms. Anyone can be a target, both individuals and billion-dollar organizations.
This explains why Facebook is the most popular search keyword for hacking-related incidents. We’re talking about a whopping 68,000 searches every month!
But why do Facebook accounts get hacked, and so often? What can you do about it? Are there any special hacks to outsmart hackers? Keep reading!
- Why do Facebook accounts get hacked
- The menace of paid verification
- How Mavlers preempts Meta hacks
- How Mavlers responds to unexpected breaches
- The results from our internal investigations
- Does Meta provide refunds?
Why Do FB Accounts Get Hacked?
The simple answer is: easy money. Think of Facebook as “weed” in an underground dark economy that operates across the world. (No, not just in Russia, in case you’re wondering.)
In fact, password theft is no longer as big a threat as before. Cybercriminals are after your cookies, not your passwords. If they get hold of a valid cookie, they don’t need to know your password or username. They can bypass the authentication protocols, including MFA.
Blame it on the nature of cookies. The moment you log in to a website, the server creates a cookie on your device. The cookie contains a unique identifier. You can think of it like the unique shape of your bite on an actual cookie.
So this “identifier” tells the server that it’s you. So it keeps you logged in. You don’t need to enter your credentials the next time you want to navigate the website. Websites trust the information stored in your cookie. The validity of the cookie signals the validity of the user.
But what about MFA? The fact is that MFA is meant for login, not session. Anybody can log in with a valid cookie. Once you log in, MFA ceases to operate. The cookie then acts as a session token. The hacker uses this token to impersonate you, and access your FB account.
But how do hackers get access to your cookies? Vox’s survey last year identified a roaring black market for FB accounts in Vietnam where hackers can buy 1,000 US cookies for just $80. One Telegram channel offered 100 fake FB support email addresses for $50 only.
You can’t tell these fake support emails from the genuine. You’ll be led to think they’re coming from Meta’s support team. But that’s just one way hackers breach your account.
Read more: The Ultimate Guide to Enhanced Website Security
The Menace of Paid Verification
Paid verification seems to have made it easier for hackers to infiltrate Meta accounts. Previously, verification badges used to be given away for free.
But now, thanks to Meta Verifier, it’s easier for hackers to acquire a badge in order to appear legitimate. Users tend to trust these “verified” FB accounts, and fall prey to scams. It’s like the court of law handing over the perfect alibi to an accused. At least, it seems so for now.
It’s important to note that hackers don’t go after all verifications. They value accounts that got verified earlier. So they target legacy checkmarks. In general, more users follow these trusted accounts, leading hackers to cast their nets wider.
We’re not sure why Meta would facilitate bad actors. Of course they’re not doing it for that reason. But this explains why many users identify Meta as the real culprit, not hackers.
For one thing, FB does not have a customer support line. The best you can do is either contact the Help center or raise it with the support team. The latter is not that efficient, either.
But that’s a wrangle for another time. The question is what you can do to hold off these threats.
Read more: Why WordPress Gets Hacked?
How Mavlers Preempts Meta Hacks
There’s no questioning the sophistication of hackers. That said, it’s not best practice to bypass basic safety measures. Yes, hackers have found ways to overcome passwords and MFA. Still, it doesn’t mean it shouldn’t be part of your security protocols. The prevalence of cancerous microplastic doesn’t justify continuing smoking, right?
So here’s how we at Mavlers try to forestall Meta hacks. (The list is not exhaustive of course. But these are the best we have, garnered from years of experience and observation.)
- Enable 2-factor authentication on mobile
- Enable 2-factor authentication on Business Ad Manager on mobile
- Remove apps or websites from Meta ads
- Remove inactive users from Business Manager
- Avoid saving your Facebook password in a browser; save it on Google Keep
- Keep alternate/multiple Business Managers in Meta Ads
- Create strong, complex passwords; prioritize biweekly password change
- Avoid assigning multiple business accounts to a single “business manager” account
- Request your bank to hold the spend on Meta ads
- Keep the Spend limit in your Meta Ads payment profile
- Delete previously added credit cards
- Delete inactive campaigns that are pending client approval for a long time
- Avoid clicking on any suspicious message or phishing email
- Enable login alerts
- Implement restrictions on certain devices, browsers
- Implement a blocklist for junk placements and apps, specifically targeting affiliate placements that hackers use to send traffic
- Exclude irrelevant locations to further define the boundaries of your ads; for instance, if you’re running a US campaign, exclude all other countries
- Secure your central business manager login credentials
- Ask your IT team to scan all devices used for Meta Ads
- Start using Yubikey for team members working on Meta Ads
- Use Facebook Protect
- Avoid using Meta logins while logging in through VPN
- Avoid requesting direct login credentials for a client’s Facebook account; rather, request Advertiser role access on their personal/business profile
- Maintain system security by ensuring that your PC’s security software is up to date and not utilizing any expired or cracked versions
- Exercise caution when connecting third-party applications to your advertising account
- Regular audits of security protocols and proactive measures to address potential vulnerabilities for maintaining the integrity of online advertising accounts
How Mavlers Responds to Unexpected Breaches
Prompt action is the key to lessening the impact of hacking. Upon discovering any breach in a client’s Facebook advertiser account, Mavlers takes the following steps:
- Pause all ads we had running for a while; this is to stop any more money from being lost. Learn how Mavlers ensures that my paid media budget is well-spent
- Get in touch with Facebook’s support team and raise the issue with them
- Reset password; for additional security, use a YubiKey; it’s a hardware device that can generate special passwords and use advanced security protocols to keep things safe.
- Identify all the changes made to ad campaigns, and change them back to how they were before
- Conduct an internal investigation; it’s important for us to understand what went wrong and how we could stop it from happening again
- Communicate with all stakeholders transparently
The Results from Our Internal Investigations
There are various ways hackers can get access to your Facebook accounts. But in our internal investigations, we always start asking questions along these lines:
- Social engineering: Hackers may use social engineering techniques to manipulate individuals within an org to reveal login credentials or other sensitive information.
- Unsecured Wi-Fi networks: Logging into FB business accounts from unsecured or public Wi-Fi networks can expose login credentials to potential interception by hackers.
- Sharing login credentials: Make sure no one’s sharing login credentials unwittingly with any third-party applications. It’s so evident people tend to overlook it.
- Malware: Malicious software installed on the account owner’s device can capture login info and grant access to hackers. Almost all cyber attacks involve some kind of malware.
- Phishing: If you click a link in a phishing email or enter your information on a phishing website, you could be giving your ad account credentials to a hacker.
- 2FA protocol: The 2FA security protocol requires you to enter a second login code, in addition to your password, whenever you log in to your account. This makes it much more difficult for hackers to gain access, even if they steal your password.
- Third-party vulnerabilities: If you connect third-party apps to your ad account, make sure they are reputable and have good security practices. Vulnerabilities in third-party apps could allow hackers to gain access to your ad account.
- Insider threats: In some cases, ad accounts can be hacked by someone with authorized access, such as a disgruntled employee or contractor.
- Weak passwords: If an account has a weak password that is easily guessable or susceptible to brute-force attacks, hackers may gain access.
Does Meta Provide Refunds For Unauthorized Spending Resulting From Hacking?
Yes, Meta is dedicated to reimbursing any unusual spending resulting from hacking incidents in your account. The refund process typically takes 2-3 months to complete. However, you may need to persistently follow up with them, as their support team can be tardy.
Hack-proof Your Facebook Account with Help from Mavlers!
Acting quickly, using strong security measures, and understanding what exactly happened can help companies reduce the dangers linked with online platforms and protect their assets and reputation. Need help with social media channel management? Let’s talk!
Majid Ali - Subject Matter Expert (SME)
As a seasoned Digital Marketing professional, Majid brings over a decade of extensive expertise in Paid Media marketing, encompassing Google Ads, Programmatic Advertising, Social Media Ads, and proficient Ad Operations. An avid learner in the realm of Generative AI, Majid has successfully served a diverse clientele comprising over 500 businesses, ranging from small-scale enterprises to large corporations, delivering tailored marketing solutions to meet their unique needs and business goals.
Susmit Panda
A realist at heart and an idealist at head, Susmit is a content writer at Mavlers. He has been in the digital marketing industry for half a decade. When not writing, he can be seen squinting at his Kindle, awestruck.
A Walk Down The Road of Link Building Endeavors At Mavlers
Local Agency vs. Offshore PPC Partners ~ How to make the right decision