How to recover a hacked Instagram account?
If your account has been hacked, you can request help from Instagram on this page through your device or computer: https://www.instagram.com/hacked/ . You will find the following options:
- They hacked my account
- I forgot my password
- The login code was sent to a mobile number or email that I don’t have access to
- Someone used my name, photos, or information to create a new account
- My account has been disabled
- Other
When selecting the option “my account was hacked”, you will be asked to enter your username, phone number or email. If you have multiple accounts, you can choose the one that has been hacked.
You will receive an email from [email protected] which will tell you that your email address has been changed. If other information, such as your password, was also changed and you can’t change your email address again, request a login link or security code from Instagram.
Then, to confirm that the account belongs to you, follow these steps:
1.- On the sign-in screen, tap Get help signing in (Android) or Forgot your password? (iPhone or web browsers).
2.- Enter the username, email address or phone number linked to your account, and then tap Next.
3.- Select your email address or your phone number and tap Next.
4.- Click on the login link in the email or text message (SMS), and follow the instructions on the screen.
More tools to keep your Instagram account safe
In addition to this tool, Instagram launched new ways to prevent and solve problems on the platform.
Through automated systems, the platform removed accounts that seemed suspicious or malicious, as well as those that violated community guidelines.
They also send out warnings if they suspect that one account may be impersonating another, or if someone requests to follow you.
You can also use the app Google Authenticator . With it you can add an additional layer of security to Instagram and other applications like Twitter, Facebook and Amazon.
In this way, the application will request a code generated in the authenticator, which is only valid for a few seconds. This makes the accounts much more difficult to hack, as they require that code that only the actual owner’s device has access to.