{"id":65025,"date":"2024-04-24T17:12:35","date_gmt":"2024-04-24T14:12:35","guid":{"rendered":"https:\/\/www.mywot.com\/en\/blog\/?p=65025"},"modified":"2025-01-07T10:46:34","modified_gmt":"2025-01-07T08:46:34","slug":"when-social-accounts-hacked","status":"publish","type":"post","link":"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked","title":{"rendered":"What to Do When Your Social Media Accounts Are Hacked?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Every day, countless social media profiles fall into the hands of hackers. According to <\/span><a href=\"https:\/\/gitnux.org\/social-media-hacking-statistics\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Gitnux<\/span><\/a><span style=\"font-weight: 400;\">, in a month, about 1.4 billion social media accounts are hijacked, and the majority of these happen on Facebook and Instagram, a report by <\/span><a href=\"https:\/\/vpncentral.com\/most-hacked-accounts-study\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">VPNCentral<\/span><\/a><span style=\"font-weight: 400;\"> stated. If you thought your profile was secure, think again.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Social Media Account Hacking Defined<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Social media account hacking is when someone who isn\u2019t you gets into your accounts on platforms like:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Facebook<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Twitter<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Instagram<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">LinkedIn<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">WhatsApp<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">They can then steal your identity, money and even ruin your reputation. Knowing how this all works could come in handy if you ever need to stop a hacker in their tracks.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">5 Signs That Your Social Account Might Be Hacked<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Finding out how are social media accounts hacked is a wise way to understand and prevent potential security breaches. Here\u2019s what you need to know about the signs to watch for:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Changes You Didn\u2019t Make<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It\u2019s obvious when something in your account has been changed by someone who wasn\u2019t you. This might be a change to your profile information, such as your bio or email address. If you receive an email saying that your password was changed and you didn\u2019t do it yourself, then someone else definitely gained access to your account.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2. Logins That You Don\u2019t Recognize<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Some platforms send an email or push notification when there\u2019s a login from a new device or location. If this happens and it wasn\u2019t just you on a different computer, then it\u2019s safe to assume that an unauthorized person has entered your account. These alerts can be valuable if they\u2019re the first warning of a security breach.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. Strange Activities<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">When friends or family tell you that they\u2019ve seen weird behavior on your account, don&#8217;t take it lightly. This could mean:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Messages were sent from it that you never typed<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Posts were published in styles unlike yours<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Likes and follows were performed that don&#8217;t look familiar<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Because hackers often use compromised accounts as stepping stones for spreading malware or sending phishing links, these activities can sometimes be very obvious.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">4. Information That Doesn\u2019t Match<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Hackers will sometimes change information associated with your account so that you\u2019re locked out of it (and they have free rein). Or they may change things in order to steal your identity later on. Regularly check for any signs of tampering with details like the following:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Contact information<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Linked accounts<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security settings<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">5. Check-Ins From Somewhere You Haven\u2019t Been<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">When social media platforms allow check-ins or have location tagging features available, being tagged at somewhere unfamiliar is alarming. Someone else might be doing it while pretending to be you. They could be doing this to create a false story or to engage in activities that would tarnish your reputation.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What Should You Do If Your Social Media Account Is Hacked<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">It can be very alarming to discover that your social media account has been hacked. However, acting quickly and taking decisive action can help you control the damage and regain access to your account. Here are the best actions to take if this happens:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Monitor Your Account Security with WOT<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">WOT has a range of checking <\/span><a href=\"https:\/\/www.mywot.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">trusted websites<\/span><\/a><span style=\"font-weight: 400;\"> tools that are designed to keep you safe online, particularly when dealing with hacked social media accounts. Their browser extensions and apps for mobile devices all come with monitoring features to track data breaches.<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-67475 size-full\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2024\/04\/monitor-for-data-breaches.png\" alt=\"monitor for data breaches\" width=\"318\" height=\"706\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2024\/04\/monitor-for-data-breaches.png 318w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2024\/04\/monitor-for-data-breaches-135x300.png 135w\" sizes=\"(max-width: 318px) 100vw, 318px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">When this feature is turned on, it notifies you if social media accounts that are linked to your email have been hacked. This proactive approach lets you address these vulnerabilities immediately before they turn into bigger problems.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2. Immediately Change Your Password<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The first thing to do when you suspect a hack is to change your password right away. The quicker you do it, the less time the hacker will have to further access your account. When creating a new password, make sure it is strong and unique &#8211; one good tip is to mix it with the following:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Upper and lower case letters<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Numbers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Special characters (if allowed)<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Another important thing is not to use easily guessable information for your passwords such as birthdays or common words. If you&#8217;ve used the same password across different platforms, changing all those passwords too is crucial because reusing them across multiple places could cause widespread breaches in your accounts.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. Notify Your Network<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">After securing your account with a new password, make sure you inform friends, family members, colleagues or anyone else who follows you about the breach so they don&#8217;t fall victim to scams or phishing links sent by the hacker through your account\u2019s messages.<\/span><\/p>\n<p><b>Here\u2019s a tip:<\/b><span style=\"font-weight: 400;\"> A simple message clearly explaining what happened would do it. This will also help build trust with them since they now know what had happened rather than thinking you were the one doing it on purpose.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">4. Enable Two-Factor Authentication<\/span><\/h3>\n<p><a href=\"https:\/\/www.mywot.com\/blog\/two-factor-authentication-2fa\"><span style=\"font-weight: 400;\">Two-factor authentication (2FA)<\/span><\/a><span style=\"font-weight: 400;\"> is one of the most effective methods on <\/span><a href=\"https:\/\/www.mywot.com\/blog\/protect-from-hackers\"><span style=\"font-weight: 400;\">how to protect yourself against hackers<\/span><\/a><span style=\"font-weight: 400;\">. With 2FA, even if someone has your password, they won&#8217;t be able to access your account without the second verification step which is usually a code sent to your mobile device or generated by an authenticator app.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most social media platforms have this feature and turning it on for yours will greatly increase its overall security. This simple yet effective measure can be what sets apart a minor inconvenience from a major breach in your accounts.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">5. Review Account Permissions<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Regularly checking which third-party apps and services are connected to your social media accounts is vital. Hackers often take advantage of these connections to gain access to your account.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Go through the list of apps and websites that have permission to access your account and remove any that you don&#8217;t recognize or need anymore. This process not only helps secure your account post-hack but also prevents unauthorized future access too.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">6. Scan for Malware and Viruses<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">If someone has taken over your social media account, there\u2019s a chance that your device might have been infected with malware or a virus. Doing a deep scan using trustworthy antivirus software can help you identify and deal with any harmful software. This is especially important because malware can put not only your social media accounts but also other sensitive information stored on your device in danger.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">7. Look for Fishy Business<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Once you\u2019ve regained control of your account, look through all the recent activity to see if anything sketchy was posted, sent or changed while the hacker was in control. Going through this review will give you an idea of how much damage has already been done and it\u2019ll be easier to report the incident accurately to the platform. It\u2019s always a good idea to check what settings have been changed (especially security and privacy) by the hacker.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">8. Get in Touch With The Platform<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">If you\u2019re having trouble taking back ownership of your account or if you notice anything fishy after having taken it back, reach out to the support team of the platform you\u2019re using. Most platforms provide dedicated resources to handle these kinds of issues and they should be able to provide additional support if needed. Make sure you keep all forms of communication with them just in case things go horribly wrong.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">9. Be Wary<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The last thing you want is for this situation to happen again, so try to be mindful about anything unusual regarding your online presence from now on. Pay more attention to what links you click on and what kind of information you share with others online. Regularly updating yourself about cybersecurity and going by best practices can do wonders when it comes to <\/span><a href=\"https:\/\/www.mywot.com\/blog\/internet-safety-tips\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">keeping yourself safe on the internet<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Securing Your Trail of Data<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In the end, it&#8217;s pretty obvious that the safety of your social media accounts is more than just hiding your personal life. It&#8217;s all about covering your tracks on a larger scale. With the rise in hacking incidents, you need to be proactive with online security. Understanding why are social media accounts hacked can help you implement stronger security measures and protect your online presence. Keeping an eye out for warning signs that your account has been compromised, and by regularly updating security measures, you may be able to dodge most of these digital mishaps.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So instead of waiting for it to happen and then trying to fix it, build a wall right now. This way, no one can get through to you in the first place. The steps you take today will definitely help keep future threats at bay. So make sure your online safety is always evolving, because nobody wants their business spread all over this vast world wide web.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">FAQs<\/span><\/h2>\n<p><b>Can personal information be accessed through social media accounts?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Yes. With a hacked social media account, hackers can access your personal information like email address and phone number. They may even get more sensitive data like your physical address or financial details. Hackers often target social media accounts because of this.<\/span><\/p>\n<p><b>What hacking methods do they use?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There are multiple approaches to breach a social media account. <\/span><a href=\"https:\/\/www.mywot.com\/blog\/spot-stop-phishing-attacks\"><span style=\"font-weight: 400;\">Phishing attacks<\/span><\/a><span style=\"font-weight: 400;\"> are one common method and this is where users are tricked into revealing their login credentials. Malware that\u2019s downloaded by accident is another way to compromise an account&#8217;s security. Exploiting weak passwords or reused ones also make it easy for hackers to gain unauthorized access.<\/span><\/p>\n<p><b>When should I change my social media password?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">For everyone&#8217;s safety, update them every three to six months. It\u2019s also important to be alert if you suspect any suspicious activity or if there&#8217;s a widespread security breach reported. In these situations, change your passwords immediately as well.<\/span><\/p>\n<p><b>Is two-factor authentication foolproof?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Although two-factor authentication (2FA) adds an extra layer of security, it does not guarantee total protection from hackers. It significantly reduces the chances of unauthorized access but users should still be cautious. For instance, SMS-based 2FA can be vulnerable to SIM swapping attacks which makes using an authenticator app for 2FA generally more secure than SMS.<\/span><\/p>\n<p><b>Can I recover an account that has been permanently hacked?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The recovery process depends on several factors including the platform\u2019s policy and the gravity of the hack itself. Most platforms have a process but its success varies from one to another. Immediate action and providing accurate verification details increase the chances of successful recovery though so don\u2019t lose hope!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every day, countless social media profiles fall into the hands of hackers. According to Gitnux, in a month, about 1.4 billion social media accounts are hijacked, and the majority of these happen on Facebook and Instagram, a report by VPNCentral stated. If you thought your profile was secure, think again. Social Media Account Hacking Defined [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":67456,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[40],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What to Do When Your Social Media Accounts Are Hacked | WOT<\/title>\n<meta name=\"description\" content=\"Know how to protect your social media account from hackers! Get essential tips on recovery and prevention. Click to safeguard your online presence now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to Do When Your Social Media Accounts Are Hacked | WOT\" \/>\n<meta property=\"og:description\" content=\"Know how to protect your social media account from hackers! Get essential tips on recovery and prevention. Click to safeguard your online presence now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked\" \/>\n<meta property=\"og:site_name\" content=\"WOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weboftrust\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-24T14:12:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T08:46:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/08\/What-to-do-when-your-social-media-accounts-are-hacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"608\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alex at WOT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:site\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex at WOT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked\"},\"author\":{\"name\":\"Alex at WOT\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\"},\"headline\":\"What to Do When Your Social Media Accounts Are Hacked?\",\"datePublished\":\"2024-04-24T14:12:35+00:00\",\"dateModified\":\"2025-01-07T08:46:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked\"},\"wordCount\":1752,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"articleSection\":[\"Online Privacy Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked\",\"url\":\"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked\",\"name\":\"What to Do When Your Social Media Accounts Are Hacked | WOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\"},\"datePublished\":\"2024-04-24T14:12:35+00:00\",\"dateModified\":\"2025-01-07T08:46:34+00:00\",\"description\":\"Know how to protect your social media account from hackers! Get essential tips on recovery and prevention. Click to safeguard your online presence now!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mywot.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to Do When Your Social Media Accounts Are Hacked?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"name\":\"WOT\",\"description\":\"Safe Web Search &amp; Browsing\",\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"alternateName\":\"WOT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mywot.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\",\"name\":\"Web of Trust\",\"alternateName\":\"WOT\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"contentUrl\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"width\":395,\"height\":150,\"caption\":\"Web of Trust\"},\"image\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weboftrust\",\"https:\/\/twitter.com\/Web_of_Trust\",\"https:\/\/www.linkedin.com\/company\/wot-services-ltd.\",\"https:\/\/www.youtube.com\/user\/MyWOT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\",\"name\":\"Alex at WOT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"caption\":\"Alex at WOT\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to Do When Your Social Media Accounts Are Hacked | WOT","description":"Know how to protect your social media account from hackers! Get essential tips on recovery and prevention. Click to safeguard your online presence now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked","og_locale":"en_US","og_type":"article","og_title":"What to Do When Your Social Media Accounts Are Hacked | WOT","og_description":"Know how to protect your social media account from hackers! Get essential tips on recovery and prevention. Click to safeguard your online presence now!","og_url":"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked","og_site_name":"WOT","article_publisher":"https:\/\/www.facebook.com\/weboftrust","article_published_time":"2024-04-24T14:12:35+00:00","article_modified_time":"2025-01-07T08:46:34+00:00","og_image":[{"width":1024,"height":608,"url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/08\/What-to-do-when-your-social-media-accounts-are-hacked.jpg","type":"image\/jpeg"}],"author":"Alex at WOT","twitter_card":"summary_large_image","twitter_creator":"@Web_of_Trust","twitter_site":"@Web_of_Trust","twitter_misc":{"Written by":"Alex at WOT","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked#article","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked"},"author":{"name":"Alex at WOT","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9"},"headline":"What to Do When Your Social Media Accounts Are Hacked?","datePublished":"2024-04-24T14:12:35+00:00","dateModified":"2025-01-07T08:46:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked"},"wordCount":1752,"commentCount":0,"publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"articleSection":["Online Privacy Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked","url":"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked","name":"What to Do When Your Social Media Accounts Are Hacked | WOT","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/#website"},"datePublished":"2024-04-24T14:12:35+00:00","dateModified":"2025-01-07T08:46:34+00:00","description":"Know how to protect your social media account from hackers! Get essential tips on recovery and prevention. Click to safeguard your online presence now!","breadcrumb":{"@id":"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mywot.com\/blog\/when-social-accounts-hacked#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mywot.com\/blog"},{"@type":"ListItem","position":2,"name":"What to Do When Your Social Media Accounts Are Hacked?"}]},{"@type":"WebSite","@id":"https:\/\/www.mywot.com\/blog\/#website","url":"https:\/\/www.mywot.com\/blog\/","name":"WOT","description":"Safe Web Search &amp; Browsing","publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"alternateName":"WOT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mywot.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mywot.com\/blog\/#organization","name":"Web of Trust","alternateName":"WOT","url":"https:\/\/www.mywot.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","contentUrl":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","width":395,"height":150,"caption":"Web of Trust"},"image":{"@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weboftrust","https:\/\/twitter.com\/Web_of_Trust","https:\/\/www.linkedin.com\/company\/wot-services-ltd.","https:\/\/www.youtube.com\/user\/MyWOT"]},{"@type":"Person","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9","name":"Alex at WOT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","caption":"Alex at WOT"}}]}},"_links":{"self":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65025"}],"collection":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/comments?post=65025"}],"version-history":[{"count":8,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65025\/revisions"}],"predecessor-version":[{"id":68082,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65025\/revisions\/68082"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media\/67456"}],"wp:attachment":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media?parent=65025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/categories?post=65025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/tags?post=65025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}