How to Recover a Hacked Instagram, Facebook, X, or Google Account
Platform-specific recovery steps for hacked social media accounts. Detailed guides for Instagram, Facebook, X/Twitter, and Google account recovery.

How to Recover a Hacked Instagram, Facebook, X, or Google Account
Each social media platform has its own recovery process, and knowing the right steps can mean the difference between getting your account back in minutes versus weeks. This guide covers the exact recovery procedures for the four most commonly hacked platforms.
Before you start, if you have not yet taken emergency measures, read our account hacked response guide first.
Instagram Account Recovery
Instagram is one of the most targeted platforms for account takeovers. Hackers often change the email and phone number immediately, making standard recovery difficult.
If You Can Still Log In
- Go to Settings > Account Center > Password and security
- Change your password immediately
- Enable two-factor authentication
- Check Login activity and log out of unknown sessions
- Go to Account Center > Personal details and verify your email and phone number
If You Are Locked Out
- Go to the login screen and tap "Forgot password?"
- Enter your username, email, or phone number
- Check for a login link in your email or SMS
- If the email was changed, look for a message from security@mail.instagram.com with the subject "Your email address was changed" — it contains a "revert this change" link
If Standard Recovery Fails
- Open the Instagram app and tap "Get help logging in"
- Enter your username and tap "Need more help?"
- Request a security code — Instagram will send it to your original email or phone
- Video selfie verification — Instagram may ask you to record a short video of yourself turning your head. This is compared against photos on your profile
- Submit a support request at help.instagram.com under "Hacked Accounts"
Important Notes for Instagram
- Video selfie verification only works if your profile has photos of your face
- Business accounts can contact Facebook Business support for faster help
- Recovery can take days to weeks; keep checking your email for responses
- Do not create a new account with the same email while recovery is pending
Facebook Account Recovery
Facebook has one of the most structured recovery systems. The key is acting quickly before the attacker modifies all recovery options.
If You Can Still Log In
- Go to Settings > Security and login
- Under "Where you're logged in," remove all sessions you do not recognize
- Change your password
- Enable two-factor authentication
- Review Authorized logins and remove unfamiliar devices
If You Are Locked Out
- Visit facebook.com/hacked — this is the official entry point
- Click "My Account Is Compromised"
- Enter your email, phone, username, or full name
- Enter your old or current password — Facebook accepts both for verification
- Choose "Secure My Account" and follow the guided steps
If the Email and Phone Were Changed
- Go to facebook.com/login/identify
- Search for your account by name, email, or phone
- Select your account from the results
- Choose to receive a recovery code via a method you still have access to
- If none are available, tap "No longer have access to these?"
- Facebook may ask you to identify friends by their photos (Trusted Contacts), or submit a government ID
Trusted Contacts Recovery
If you set up Trusted Contacts before the hack:
- Ask 3 to 5 of your trusted contacts to go to facebook.com/recover
- They will each receive a unique security code
- Collect the codes and enter them on the recovery page
Important Notes for Facebook
- facebook.com/hacked is the fastest route — do not use the general help center
- Government ID verification usually takes 1-3 business days
- If your account is being used to scam others, you can report it via facebook.com/help/reportcompromised
X/Twitter Account Recovery
X (formerly Twitter) recovery depends heavily on whether you still have access to your associated email.
If You Can Still Log In
- Go to Settings > Security and account access > Security
- Change your password
- Under Sessions, review and log out of unfamiliar sessions
- Enable two-factor authentication
- Review Connected apps and revoke anything suspicious
If You Are Locked Out
- Go to twitter.com/account/begin_password_reset
- Enter your email, phone, or username
- Choose your recovery method — email or phone
- Enter the code sent to your recovery method
- Set a new password
If the Email Was Changed
- Check your old email for a notification from X about the email change — it includes a link to revert the change
- If no email is found, go to help.twitter.com
- Select "I need to regain access to my account"
- Fill out the support form with:
- Your account username
- The email address you used to create the account
- The approximate date you lost access
- A description of what happened
- Check your email for responses from X support
Important Notes for X/Twitter
- X prioritizes accounts with phone numbers associated — add one as soon as you recover access
- Verified accounts may get faster support
- If your account was suspended (not hacked), the process is different — use help.twitter.com/forms/general
Google Account Recovery
A hacked Google account is especially critical because it serves as the backbone for Gmail, YouTube, Google Drive, and Android devices.
If You Can Still Log In
- Go to myaccount.google.com > Security
- Change your password
- Under "Your devices," sign out of all unfamiliar sessions
- Review "Third-party apps with account access" and remove unknown ones
- Enable 2-Step Verification with an authenticator app
- Check Gmail > Settings > Forwarding for unauthorized email forwarding rules
If You Are Locked Out
- Go to accounts.google.com/signin/recovery
- Enter your Gmail address
- Google will try several verification methods in sequence:
- Your most recent password
- A verification code sent to your recovery phone
- A verification code sent to your recovery email
- A security code from Google Authenticator
- Answering security questions
- Answer as many as you can — Google uses a confidence score; the more you answer correctly, the more likely you are to regain access
If All Recovery Methods Fail
- Use a device and browser you have previously used to log into this account — Google recognizes trusted devices
- Try recovering from your home or work network — a familiar IP address strengthens your claim
- Wait 24 hours and try again — Google sometimes throttles recovery attempts
- If nothing works, fill out the Google Account Recovery form
Important Notes for Google
- Recovery is significantly easier from a device you have used before
- The location from which you attempt recovery matters
- Google does not offer live support for free accounts — the process is entirely automated
- Google Workspace (business) accounts should contact their administrator
General Tips That Apply to All Platforms
Before a Hack Happens
| Action | Why it matters |
|---|---|
| Enable 2FA on every account | Blocks login even with stolen password |
| Add a recovery phone AND email | Gives multiple paths back into your account |
| Use unique passwords | Prevents credential stuffing across platforms |
| Keep recovery codes safe | Last resort when all other methods fail |
During Recovery
- Act within 24 hours — The longer you wait, the more changes the attacker can make
- Check your email for security alerts — Most platforms send notifications when settings change
- Do not delete the hacked account — This makes recovery impossible
- Screenshot everything — Save evidence of unauthorized activity for support requests
After Recovery
- Change passwords on all accounts that used the same credentials
- Enable 2FA everywhere
- Review and revoke connected third-party apps
- Monitor for suspicious activity over the next several weeks
Keep Your Recovery Information Secure
During the recovery process, you may receive temporary passwords, security codes, or recovery links. Instead of letting these sit in your iMessage or Messenger history, store them temporarily in a password-protected memo on LOCK.PUB with a short expiration time. Once the recovery is complete, the information expires and disappears.
After recovery, use LOCK.PUB to securely store your new passwords and backup codes — protected by a master password that only you know.
Keywords
You might also like
Encrypt Link: How to Encrypt Any URL for Free
Learn how to encrypt any link for free. Create encrypted URLs with password protection, expiration dates, and one-time access. Complete guide to link encryption.
How to Hide Photos on Your Phone — iPhone & Android Complete Guide
Learn to hide photos using iPhone Hidden album, Android Secure Folder, Google Photos Locked Folder, and third-party encryption apps.
How to Safely Share Your Solana Wallet Key (Phantom, Solflare, etc.)
Learn how to securely back up and share your Solana wallet seed phrase and private key. A security guide for Phantom, Solflare, and Solana CLI users.
Create your password-protected link now
Create password-protected links, secret memos, and encrypted chats for free.
Get Started Free