📌 The 30-Second Version
The FTC's April 2026 report on 2025 social-media-scam data is the cleanest single dataset in the consumer-fraud category. Americans lost $2.1 billion to social-media scams in 2025 — an 8x increase from 2020 and the highest figure ever recorded for that contact method. 30% of all U.S. scam losses now originate on social media. Facebook alone accounted for $794M; WhatsApp + Instagram contributed another $659M combined. Investment scams ($1.1B, 52% of social-media losses) and romance scams (60% of which start on social media) dominate the dollar volume. Five account-takeover variants — phishing-link login, friend-recovery-code hijack, verified-blue-check phishing, crypto / investment posts from hijacked-friend accounts, and recovery-scam follow-on after a public victim post. The unifying defense fits in one rule: enable authenticator-app two-factor authentication on every account, never share any verification code with anyone for any reason. Meta's official recovery paths are facebook.com/hacked and instagram.com/hacked — free, no third-party "recovery service" is legitimate.
⚡ Quick Safety Rules
- Authenticator-app 2FA on every account. Google Authenticator, Authy, 1Password, Microsoft Authenticator. Avoid SMS-based 2FA where possible (SIM-swap bypasses it).
- Never share verification codes. Real account-recovery flows do not require forwarding codes from one user to another. Any DM or text asking for a code is the diagnostic for ATO.
- Type the URL or use the official app. Login pages reached via DM or email links are credential-harvesting sites.
- Strong unique password per account. Use a password manager (Bitwarden, 1Password, Apple Keychain). Never reuse passwords across accounts.
- Review active sessions monthly. Settings → Security → Where You're Logged In. Terminate any unfamiliar sessions.
- If hacked, recover via Meta's official path. facebook.com/hacked or instagram.com/hacked. Free. Third-party "recovery services" are scams.
🪞 Has my account been compromised? — 30-second self-check
Two or more "yes" answers and the answer is yes.
- Are you receiving password-reset emails or 2FA codes you did not request?
- Are friends reporting suspicious messages from your account?
- Are there posts, DMs, or stories on your account you did not create?
- Does your active-sessions list show sessions from unfamiliar locations or devices?
- Has your registered email address or phone number changed without your action?
2+ yes: Account compromised. Change password + enable 2FA + terminate sessions + recover via official path. → Skip to What to Do
Jump to a Variant
The Anatomy of $2.1 Billion and an 8x Five-Year Climb
The FTC's April 2026 release on 2025 social-media-scam data tells the cleanest five-year story in U.S. consumer-fraud reporting. In 2020, Americans reported losing about $260 million to scams that started on social media. In 2025, the figure was $2.1 billion — an 8x increase in five years and the highest figure ever recorded for that contact method. 30% of all U.S. scam losses now originate on social media, making it the dominant contact channel across every demographic except 80+ (which is still primarily phone-targeted).
The platform breakdown is dominated by Meta. Facebook alone accounted for $794M in reported losses; WhatsApp and Instagram contributed another $659M combined; the three Meta platforms together represent roughly 70% of total social-media scam losses. Meta's response — removing 159 million scam ads and 10.9 million accounts in 2025 alone — is the largest platform-side enforcement effort on record but has not arrested the loss growth. The structural reasons: scam ads can re-spawn faster than they can be removed; account-takeover scams use compromised accounts of real users (friends and family) and are harder to detect than ad-injected fraud.
The dollar-volume split among scam types: investment scams ($1.1B, 52% of social-media losses) are the single largest category, driven primarily by pig-butchering and crypto-platform fraud that uses social media for victim sourcing. Romance scams (60% of which start on social media) are the second largest. Account-takeover scams sit at the intersection — the attacker compromises an account, then uses it as a credibility layer to deliver investment, romance, or recovery-scam pitches to the victim's friends and family. The protective conversation is the same regardless of which downstream variant lands: strong authenticator-app 2FA + a strong unique password + never sharing verification codes blocks the entry vector for nearly all account-takeover variants.
What These Scams Actually Are
Social-media account takeover (ATO) is the entry vector for most of the downstream social-media scam dollar volume. The structural mechanic across all five variants:
- Compromise a victim's credentials. Phishing pages mimicking the platform's login screen, credential reuse from data breaches, session-cookie hijacking, or social-engineered code forwarding.
- Use the compromised account as a credibility layer. Friends and family are far more likely to engage with a message from a known contact than from a stranger. The compromised account becomes a high-conversion delivery vehicle for downstream scams.
- Run downstream scams from the inside. Investment / pig-butchering pitches to friends, "I need help, can you Zelle me?" to family, fake crypto-platform recommendations to followers, recovery-scam DMs to people who recently posted about being scammed.
- Lock the legitimate user out. Change the registered email and phone, enable 2FA on the attacker's device, terminate the legitimate user's sessions. Recovery becomes harder once the registered contact info has been changed.
🔑 The single rule that defeats every variant — authenticator-app 2FA + never share verification codes
Authenticator-app 2FA (Google Authenticator, Authy, 1Password, Microsoft Authenticator) blocks the vast majority of phishing-and-credential-theft account-takeover attempts at the credential layer. SMS-based 2FA is bypassable via SIM-swap; authenticator-app 2FA is not. Combined with a strong unique password per account from a password manager, the credential layer becomes effectively unbreakable for the vast majority of attackers. The second half of the rule — never share any verification code with anyone, ever, for any reason — covers the social-engineering variants that try to bypass the credential layer through your own forwarded codes.
The 5 Variants
A phishing email or DM with a link claiming a violation, login attempt, tag, or verification request routes the recipient to a credential-harvesting page that mimics the platform's login screen. Once the credentials are captured, the attacker takes over the account. Per Meta's 2025 data, 85% of Instagram accounts have experienced some form of compromise; phishing is the largest single attack vector.
A representative case from r/Scams threads and Meta's 2025 security advisories: a user receives an email from "Instagram Help" (sender domain: notification-instagram.com — a lookalike, not instagram.com) saying her account violates community guidelines and will be deleted in 24 hours unless she verifies her identity by logging in via the included link. The link loads a page that visually matches Instagram's login screen — same fonts, layout, color scheme — but the URL is something like instagram-verification-helpdesk.com. She enters her username and password. The page returns a generic "verification successful" message. Within minutes, the attacker logs in to the real Instagram, changes her password, changes the registered email, enables 2FA on the attacker's device, and starts DMing all her followers with a crypto-investment pitch.
The protective architecture is well-developed. Authenticator-app 2FA on Instagram blocks the attacker even with the captured password — the login attempt requires the second-factor code from the user's authenticator app, which the attacker does not have. The variant works against accounts without 2FA enabled or with SMS-only 2FA where the attacker has executed a SIM-swap. Per Meta's 2025 data, accounts with authenticator-app 2FA enabled experience near-zero successful credential-phishing ATO. The defense is structurally available; the gap is consumer adoption.
What stops it is authenticator-app 2FA + URL discipline. Enable authenticator-app 2FA on Instagram, Facebook, X, TikTok, and any other social-media account. Never log in via a link in an email or DM — always type the platform URL or use the official app. If you receive a "violation" email, log into the platform directly to check; real platform notifications appear in the app's notification center, not only by email. If your account has already been compromised, recover via facebook.com/hacked or instagram.com/hacked.
Red Flags
- Email or DM with login link from a lookalike domain
- "Account violation" / "verification required" framing with 24-hour deadline
- Sender domain does not match the platform's verified domain
- Login page URL differs from facebook.com / instagram.com / x.com
Defenses
- Authenticator-app 2FA on every social-media account
- Never log in via email / DM links — type URL or use official app
- Strong unique password per account (password manager)
- If compromised: recover via facebook.com/hacked or instagram.com/hacked
Typical Money Demanded
Direct loss to ATO is rarely monetary — the attacker's downstream value is the access to the victim's friends list for crypto / pig-butchering / recovery-scam pitches.
— The second variant bypasses the password layer entirely. It uses a friend's compromised account to social-engineer the victim into forwarding their own recovery code. —
An attacker hijacks one of your friend's accounts, then DMs you (from the friend's compromised account) saying they're locked out and a recovery code is being sent to your phone — could you forward it? The "recovery code" is your own account's password-reset code, triggered by the attacker using your username. Per Meta's 2025 data, 78% of hacked Instagram accounts were used to contact the victim's friends.
A representative case: a Facebook user receives a Messenger DM from her best friend (whose account has been compromised, but she does not know that): "I'm locked out of my account and Facebook is sending a security code to your phone by mistake — can you screenshot it and send it to me?" A few seconds later her phone receives an SMS: "Your Facebook security code is 837492." She forwards the code to her "friend." The attacker, who triggered the password-reset using her email or phone, immediately uses the code to reset her password, lock her out of her account, and start the same script against her friends.
The structural feature: the attacker exploits the trust between friends to bypass the credential layer. The recipient does not believe she is sharing a code with a stranger; she believes she is helping a friend. The protective rule has to override that intuitive trust: real account-recovery flows never require one user to forward a code to another user. If a friend genuinely needs help with account recovery, the recovery flow runs through the platform's own system, not through your phone. Any DM asking for a code is diagnostic of ATO regardless of who appears to be sending it.
What stops it is the no-codes rule plus a backup-channel verification habit. Never forward any verification code to anyone, even a friend, regardless of how plausible the request sounds. If a friend genuinely seems locked out, contact them through a different channel (text, phone, in person) to verify before any action. Authenticator-app 2FA also helps because the second factor is generated by an app on your device — the attacker cannot trigger an SMS-based code that you would forward.
Red Flags
- DM from a friend asking you to forward a code that was sent to your phone
- Urgent framing ("I'm locked out, can you help?")
- You receive a verification code or password-reset code you did not request
- Friend's account behavior is unusual (unfamiliar links, unusual posts)
Defenses
- Never forward any verification code, ever, regardless of who is asking
- Authenticator-app 2FA (codes generated by app, not sent by SMS)
- Verify via a different channel (text, phone, in person) if a friend genuinely needs help
- If you forwarded a code: change password + enable 2FA + recover via Meta official path
Typical Money Demanded
Direct loss is account access; downstream cost is the same as variant #1 — friend-list-driven crypto / romance / recovery scams against your contacts.
— The third variant exploits a specific platform feature: the verification badge. Scammers send fake "verification review" emails to harvest credentials. —
A phishing email or DM claims the user's account is being reviewed for verification (or that verification status is being withdrawn unless they verify identity), and includes a link to a phishing login page. The target is users who already have a meaningful following — the verification status creates a credible pretext. Real platforms never request credentials by email or DM.
A representative case from creator-economy advisories: a small-business owner with 12,000 Instagram followers receives an email from "Meta Verified Support" telling her that her verification application requires additional identity verification within 48 hours or it will be denied. The email is well-formatted, uses Meta's color scheme, and includes a link to "complete verification." The link loads a page mimicking Meta's verification flow that asks for her Instagram username, password, government-ID photo, and a selfie. She enters everything. The attacker takes over the Instagram account, locks her out, and uses the captured ID + selfie to impersonate her on other platforms (sometimes opening fraudulent crypto exchange accounts in her name).
The variant disproportionately targets creators, small-business owners, and anyone with a meaningful following — the people for whom verification is a credible aspiration or current status. Real Meta Verified status is managed inside the Instagram and Facebook apps under Settings → Account → Meta Verified, not via email links. Real X (Twitter) verification is similarly managed inside the platform. Any email or DM requesting verification credentials is diagnostic of fraud across all platforms.
What stops it is the platform-internal verification rule. Verification status is always managed inside the platform's own settings, never via email links. If you receive a "verification" email, log into the platform directly (typed URL or official app) to check verification status; real notifications appear in the app's notification center. Authenticator-app 2FA blocks the credential layer even if you do enter a password on a phishing page. If your account has been hijacked through this variant, recover via Meta's official path and additionally place a fraud alert at the three credit bureaus if you submitted ID and selfie photos.
Red Flags
- Email claiming verification status is being reviewed or withdrawn
- Verification page asks for password + government ID + selfie
- Sender domain is a lookalike of the platform's official domain
- Urgent timeline (48 hours) to "complete verification"
Defenses
- Verification is always managed inside the platform's settings, never via email links
- Authenticator-app 2FA blocks credential layer
- Never submit government ID or selfie via inbound email links
- If hacked + ID submitted: place fraud alerts at three credit bureaus
Typical Money Demanded
Direct loss is account access + identity-verification material; downstream cost is identity-theft + fraudulent crypto-exchange accounts opened in the victim's name.
— The fourth variant runs the downstream pitch from inside the compromised account. The "investment opportunity" comes from a real friend's profile. —
After hijacking a friend's account, the attacker posts or DMs about a "crypto trading platform" or "investment opportunity" that is supposedly making the friend money. The friend's profile, post history, and follower list make the pitch credible. Per FTC 2025 data, investment scams accounted for $1.1B of the $2.1B total social-media scam losses — 52% of all social-media-scam dollars.
A representative case: a Facebook user sees a story from her cousin on Facebook: "I made $8,000 in two weeks on this trading platform. Anyone want the link?" The cousin's account looks normal — the profile photo is right, the post history matches her usual content, the followers include other family members. The user DMs the cousin to ask about the platform. A reply comes back from the cousin's account: "It's amazing, just sign up here and use code FAMILY20 for a $200 starting balance." The user signs up, deposits $1,500, sees the dashboard show rapid gains, and then encounters the canonical pig-butchering withdrawal-tax-trap (covered in our pig-butchering guide). The cousin, of course, never made the post — her account was compromised three days earlier and the attacker has been running this script against her friends and family list.
The variant is the largest single dollar-volume category in social-media scams because it combines two features: (1) the credibility of a real friend's account, and (2) the persuasive economics of an investment / get-rich pitch. The protective architecture overlaps with our pig-butchering guide on the downstream investment-platform side; the upstream defense is recognizing that an investment-pitch DM from a friend is the diagnostic — real friends do not pitch investment platforms by DM. If a friend's account starts making investment claims that seem out of character, contact them through a different channel (text, phone, in person) to verify before engaging.
What stops it is the cross-channel verification rule. Never invest based on a social-media DM, ever, regardless of who appears to be sending it. Real friends do not pitch crypto-trading platforms; the pitch itself is the diagnostic for ATO + downstream investment fraud. If you have already deposited to a flagged platform, see our pig-butchering scams guide for recovery steps.
Red Flags
- Friend's account suddenly posts about a crypto / investment platform
- DM with a "trading platform" link from a friend who has never discussed investing
- "I made $X in [short time]" framing
- Referral codes for "starting balance" bonuses
Defenses
- Never invest based on social-media DMs from friends
- Verify any investment pitch via a different channel (text, phone, in person)
- Real friends do not pitch trading platforms — the pitch is the diagnostic
- If deposited: see pig-butchering recovery
Typical Money Demanded
$1,500–$50,000+ per pig-butchering deposit · FTC 2025: investment scams = $1.1B (52%) of $2.1B total social-media scam losses.
— The fifth variant is the parasite layer. After a public victim post about an account hack, recovery-scam DMs flood in. —
Within hours of any public victim post about losing access to a Facebook / Instagram / X account, "account recovery service" DMs and emails arrive offering to recover the account for an upfront fee of $200-$2,000. Real recovery is free through Meta's official paths (facebook.com/hacked, instagram.com/hacked). Third-party recovery services are uniformly scams.
The recovery-scam follow-on is the parasitic counterpart to the ATO itself. A user posts on r/Scams, r/Instagram, or their own social media saying their account has been hacked and they cannot recover access. Within hours, three to twenty DMs and emails arrive from "specialists" offering to recover the account for fees ranging from $200 to $2,000. Some claim to be "ethical hackers"; others claim to be Meta-affiliated; others claim to have "insider relationships" with platform support teams. None are legitimate. The fees are pocketed; the account is not recovered. In some variants the "recovery service" itself is the original ATO attacker, doubling the harvest by extracting a recovery fee from the victim they already locked out.
Meta's official recovery flows are free. facebook.com/hacked and instagram.com/hacked walk users through identity verification (often video selfie or government ID) and reset access. The process can take 1-14 days depending on the account's security history; the slowness creates the market opportunity for fraudulent "expedited recovery" services. The protective rule: any third party charging for social-media account recovery is a scam.
What stops it is recognition + Meta-official-only discipline. Use only Meta's official recovery paths. Block every "recovery specialist" DM. Report the recovery-scam DMs themselves to the platform's fraud team. While waiting for Meta's recovery to complete: warn friends and family via a different channel that your account is compromised; change passwords on any other accounts that shared the compromised password; place fraud alerts at the three credit bureaus if you fear identity theft.
Red Flags
- DM or email offering to "recover" your hacked social-media account
- Upfront fee for recovery
- Claims of "Meta affiliation" or "insider relationship"
- Pressure to pay quickly with crypto / Cash App / wire
Defenses
- Use only facebook.com/hacked or instagram.com/hacked — free
- No third-party recovery service is legitimate
- Block every recovery DM; report to platform
- Warn friends + family via a different channel during recovery wait
Typical Money Demanded
$200–$2,000 in upfront recovery fees per scam attempt · 100% of third-party social-media-account recovery services are scams.
The Numbers (and Where They Come From)
🆘 What to Do If You've Been Hacked
🛡 Meta Official Recovery
Use facebook.com/hacked or instagram.com/hacked. Free. Recovery takes 1-14 days.
🔐 Change Passwords + Enable Auth-App 2FA
Once recovered, set a strong unique password and enable authenticator-app 2FA. Avoid SMS-based 2FA where possible.
🚪 Terminate All Active Sessions
Settings → Security → Where You're Logged In. Terminate every session that is not your current device.
💬 Warn Friends + Family via Different Channel
Text or call your contacts to tell them your account is compromised. Tell them not to send money to anyone messaging from your account during the recovery window.
🔄 Change Other Account Passwords
If you reused the compromised password anywhere else, change it everywhere. Use a password manager going forward.
🛡 Three-Bureau Fraud Alert
If you submitted ID or selfie photos to a phishing page, place fraud alerts at Equifax / Experian / TransUnion.
📋 FTC ReportFraud
File at reportfraud.ftc.gov. The 2026 FTC report on $2.1B in social-media scam losses was built on aggregated complaints.
🚫 Ignore Recovery DMs
Block every "account recovery specialist" DM. Report them to the platform. Real recovery is Meta-official only.
If You're Reporting Outside the United States
- United Kingdom: Action Fraud; ICO for data-protection complaints.
- Canada: CAFC.
- Australia: Scamwatch (ACCC).
- European Union: National data-protection authorities under GDPR + national consumer-protection agencies.
- Ireland: An Garda Síochána GNCCB.
Frequently Asked Questions
What is social media account takeover?
What's the single best defense?
What is the friend-recovery-code scam?
What is the verified-blue-check verification scam?
How can I tell if my account has been compromised?
How do I recover a hacked Facebook or Instagram account?
What about WhatsApp account takeover?
I've been hacked — what now?
Related Reading
- Pig-Butchering Scams — The downstream investment-fraud variant that uses hijacked friend accounts as a credibility layer.
- Recovery Scams — The "account recovery service" parasite layer; same structure across many fraud categories.
- Sextortion — AI-deepfake variant uses hijacked Instagram accounts to source target photos.