Code Defence Cyber security

Instagram “Credential Scare”: 17.5M Accounts Exposed in API Leak

Summary: Millions of Instagram users reported a surge of unrequested password reset emails today. While Meta denies a “breach” of core systems, security firm Malwarebytes has identified a database of 17.5 million users for sale on the dark web, likely stemming from a legacy API exposure. Meta clarified that an external party was abusing a technical vulnerability to trigger the reset requests.

Business Impact: For a security consultant, this is a major “Account Takeover” (ATO) warning. High-profile corporate social media accounts are at risk. The exposure of phone numbers and physical addresses in the leaked set makes executives prime targets for SIM-swapping and targeted spear-phishing.

Why It Happened: Attackers likely used the leaked database to “credential stuff” or automate password reset requests, attempting to overwhelm users into making a security mistake or to find accounts without 2FA enabled.

Recommended Executive Action: Mandate a password reset for all corporate-linked social media accounts. Ensure that “Phishing-Resistant” MFA (FIDO2/Security Keys) is enabled rather than just SMS-based 2FA.

Hashtags: #Instagram #DataLeak #Meta #CyberSecurity #MFA #InfoSec

Scroll to Top

Review My Order

0

Subtotal