Image Credit - BBC

Hacked Business Accounts Left Without Support

May 5,2025

Technology

Digital Distress: Businesses Left Stranded as Meta Struggles with Account Hijackings

Companies across diverse sectors voice increasing frustration over inadequate support from Meta when attempting to retrieve compromised profiles. The loss of access to vital Instagram and Facebook presences creates significant operational hurdles. Businesses invest considerable resources into these platforms, often making them central pillars of their marketing and customer engagement strategies. When cybercriminals strike, the resulting disruption extends far beyond a temporary inconvenience, hitting revenue streams and brand reputation hard. Navigating Meta's recovery processes frequently proves an arduous and ultimately fruitless endeavour for many affected organisations. This situation leaves numerous enterprises feeling abandoned by the very platform they rely upon for visibility and growth. The apparent lack of accessible, effective assistance exacerbates the initial shock and damage caused by the security breach itself, fostering a climate of uncertainty and mistrust towards the social media giant. The digital landscape, essential for modern commerce, becomes a source of profound vulnerability.

Initial Shock and Destabilisation

Catherine Deane, a designer concentrating on wedding attire, experienced intense turmoil when cybercriminals seized control of her firm's Instagram presence. The incident created a feeling of utter destabilisation, undermining years of effort. Instagram represented the firm's primary social media channel, the focus of substantial investment in temporal and operational capital. Her team maintained the account's dynamism by posting fresh content daily. Suddenly, this entire body of work simply vanished, leaving a significant void in their outreach efforts. The abrupt loss highlighted the precariousness of building a business presence on platforms controlled by third parties. For creative enterprises like Deane's, visual platforms such as Instagram are not merely marketing tools; they are essential galleries and direct lines to potential clientele worldwide. The hijacking effectively severed a crucial connection to their audience, impacting morale and immediate business prospects profoundly. The feeling of instability was palpable and deeply unsettling for the whole team.

The Deceptive Lure of Verification

The UK operation led by Ms Deane, bearing her name, primarily markets bridal wear online. The United States constitutes her largest customer base. Her Instagram profile currently boasts 59,000 followers, a testament to sustained engagement efforts. Several years ago, however, the enterprise lost command over this vital asset. An individual on the social media staff encountered a communication indicating the business qualified for Instagram's coveted blue-badge verification. Meta, Facebook's parent entity, manages Instagram and its verification system. This authentication symbol represented a long-sought mark of legitimacy for Ms Deane's brand. Understandable excitement surrounded the prospect of achieving this status. The message appeared official, playing on the common business desire for platform recognition and enhanced credibility. This perceived opportunity masked a significant threat, preying on trust and aspiration to bypass standard security vigilance within the organisation. The allure of the blue tick proved a potent vector for the attack.

Falling Prey to the Phishing Scheme

Consequently, the employee activated a link embedded within the deceptive message. This action led to a counterfeit Instagram validation form meticulously designed to mimic the authentic process. The form requested the account's login credentials. Believing the request legitimate, the staff member provided the necessary information, inputting both the login identifier and its related passcode. Shortly after submitting these details, malicious actors exploited the compromised credentials to assume full command over the company's Instagram profile. The speed and efficiency of the takeover underscored the attackers' preparedness. This incident exemplifies a common phishing tactic where criminals leverage social engineering, creating scenarios that bypass technical defences by manipulating human psychology. The employee's action, born from a desire to benefit the company, inadvertently opened the door to the hijackers, demonstrating the critical need for robust security awareness training across all levels of an organisation.

A Four-Month Battle for Recovery

The hijacking itself caused significant anguish on Ms Deane's behalf, but the subsequent struggle with Meta intensified her distress. Reclaiming the account involved a protracted four-month battle against perceived platform indifference. Initially, she followed protocol, completing and submitting the standard administrative dispute documentation. However, this formal approach yielded no response from Meta. Numerous follow-up electronic communications were dispatched, yet these efforts failed to prompt any discernible action or intervention from the platform's support teams. The experience of navigating the account compromise while facing a complete lack of responsive communication proved incredibly frustrating. The absence of any individual contact point, someone capable of understanding the situation's urgency and escalating the case appropriately, felt almost traumatic. This support vacuum left the business feeling isolated and powerless against the anonymous digital forces that had disrupted their operations so severely.

The Impersonal Nature of Support

The communication void persisted, amplifying the sense of helplessness. Eventually, an automated-seeming email arrived from Meta. It informed Ms Deane that her case file was now considered closed. This notification arrived despite the fact that she remained entirely incapable of accessing or regaining control over the firm's Instagram profile. The apparent disconnect between Meta's internal processes and the reality faced by the user was stark. The closure of the case without resolution felt like a dismissal of her legitimate concerns. This experience highlights a common criticism levelled against large tech platforms: the difficulty users face in accessing meaningful, human-led support, particularly when dealing with complex or non-standard issues like account hijacking. Automated systems and labyrinthine reporting procedures often create barriers rather than pathways to resolution, leaving users like Ms Deane stranded in digital limbo despite their persistent efforts.

Hacked

Image Credit - BBC

Resolution Through Informal Channels

Ultimately, the protracted issue found a resolution for Ms Deane's situation, not through official channels, but via an informal internal contact. Someone within her company happened to possess a connection to an individual employed at Facebook. Recognising this as potentially their only viable route, Ms Deane's team adopted a strategy of persistent communication. They emailed this contact person daily throughout the entire four-month ordeal, consistently outlining their situation and pleading for assistance. Ms Deane surmises that the eventual reinstatement of the profile likely resulted from this relentless pressure. She suggests the contact possibly intervened primarily to cease the persistent appeals. While grateful for the eventual outcome, this resolution underscores a significant flaw: access to effective support seemingly depended not on the merit of the case, but on leveraging personal networks within the tech giant—a recourse unavailable to most users.

A Problem of Significant Scale

Jonas Borchgrevink leads Hacked.com, a cybersecurity firm operating from the United States. According to him, Catherine Deane's ordeal is hardly an unique circumstance among businesses utilising Instagram plus Facebook profiles. Mr Borchgrevink characterises the situation as an enormous challenge currently facing the digital business community. He estimates that potentially thousands of organisations are deprived of access to their vital business pages every single day due to hacking incidents. This assessment paints a picture of a widespread, ongoing crisis impacting companies globally. The sheer volume suggested by his estimate indicates that individual stories, while impactful, represent only the visible tip of a much larger iceberg. The cumulative economic and operational damage stemming from these daily incidents is likely substantial, affecting businesses of all sizes across countless industries that rely on Meta's platforms for essential functions.

The High Cost of Recovery

Mr Borchgrevink's company specialises in assisting firms navigate the complex process of recovering compromised profiles on Instagram plus Facebook. His enterprise typically secures between ten and fifteen new client engagements each week specifically for this purpose. However, he provides an important caveat regarding these figures. These numbers, he cautions, only reflect the businesses that are specifically aware of Hacked.com's services and possess the financial resources necessary to engage them. The cost of professional recovery assistance is not insignificant. Furthermore, resolving these complex account hijacking cases can be a lengthy process, often requiring periods extending as long as half a year. This combination of cost and time commitment means that professional help remains out of reach for many smaller businesses, precisely those who might be most vulnerable and least equipped to handle the fallout of such an incident independently.

Meta's Official Position and Advice

When the BBC requested specific data from Meta to quantify the extent of the profile hijacking problem and detail the corporation's mitigation strategies, Meta declined the request. The company opted against releasing internal figures or specific operational details regarding its handling of compromised business accounts. Nevertheless, Meta did issue a formal statement addressing the issue more broadly. Within this communication, the corporation affirmed its serious commitment to maintaining the protection plus security for its online community. The statement included standard security recommendations, encouraging all users to create strong, unique passcodes for their accounts. It also strongly advocated for the activation of two-factor authentication (2FA) as an additional security layer. Furthermore, Meta advised users to cultivate a healthy suspicion towards unsolicited electronic mail or direct messages that request sensitive personal details, a common vector for phishing attacks.

Highlighting Existing Security Tools

In addition to general security advice, Meta's statement highlighted an existing platform feature designed to aid users in managing their account security. This tool, known as Security Check-up, is available for both profiles on Instagram together with Facebook. Meta presented this feature as a resource intended to empower individuals and businesses to proactively review and strengthen their account security settings. The check-up guides users through steps like reviewing login activity, managing connected apps, and confirming recovery contact information. While promoting such tools is a positive step, critics argue that reliance on user-initiated checks may not sufficiently address the sophisticated and often aggressive tactics employed by cybercriminals. The effectiveness of these tools also depends heavily on user awareness and consistent engagement, which can vary significantly, particularly within busy small business environments where dedicated IT security resources may be limited.

Diverse Motivations of Cybercriminals

Hackers pursue dominion over corporate social media profiles due to a multitude of reasons, reflecting the various ways compromised profiles can be illicitly monetised or weaponised. One common objective involves using the established reputation and follower base of the hijacked page to market counterfeit products or promote fraudulent investment schemes through scam advertisements. Another key motivation is the harvesting of sensitive personal information, either from the business itself or from its followers who interact with malicious content posted on the compromised page. Furthermore, attackers may utilise the account to distribute malware, infecting the devices of unsuspecting followers who click on corrupted links. Manipulating followers to transfer funds directly through fake appeals or contests represents another profitable avenue. Finally, criminals may resort to direct blackmail, demanding a ransom payment from the legitimate account owner in exchange for restoring access - a tactic known as ransomware applied to social media assets.

Blackmail: A Tangible Threat

This final motive—extortion—became a harsh reality last year for David Davila. Mr Davila contributes to the marketing efforts with Quantum Windows & Doors, a relatively small, family-operated company situated within Washington state in the United States. He found himself denied access to the company's official Facebook account after interacting with what later proved to be a fraudulent message cleverly disguised as an official communication originating from Meta. As his private mobile telephone number connected to the business account for security purposes, this crucial piece of contact information also was acquired by the con artists during the breach. Shortly after the lockout occurred, Mr Davila received an unsolicited message via WhatsApp. The message contained a clear ransom demand: the scammers required a payment of 1,200 US dollars (approximately £900 GBP at the time) to unlock and return command over the company's Facebook profile.

The Perils of Seeking Help

Facing the lockout and the subsequent extortion demand, Mr Davila attempted to find legitimate support channels. Unable to readily locate an official Meta helpline number specifically for this type of emergency, he resorted to searching online for assistance. Unfortunately, this search led him down a dangerous path. The telephone number he found and subsequently called did not connect him with Meta support or a legitimate recovery service.

Instead, it routed him directly to another group of scammers, individuals poised to exploit victims already in distress. These secondary scammers often prey on the urgency and desperation of those trying to retrieve compromised profiles, sometimes charging bogus fees for non-existent services or attempting further phishing attacks. Thankfully, the misleading link Mr Davila initially found was later identified and removed. Fortunately for Quantum Windows & Doors, Mr Davila successfully regained access to the Facebook profile some days afterwards, avoiding both the ransom payment and further victimisation by the fake support line.

Hacked

Image Credit - BBC

Is Meta Overwhelmed?

Cybersecurity expert Jonas Borchgrevink offers a perspective on why resolving these issues seems so challenging for businesses. He suggests that Meta, despite its vast resources, appears to be fundamentally inundated by the sheer volume of the account hijacking problem. Mr Borchgrevink notes that Meta has indeed implemented various security enhancements and protocols across time, ostensibly aimed at combating this threat. Yet, despite these platform-level changes, his firm, Hacked.com, continues to receive a consistently high volume of clients seeking help with compromised accounts. This steady influx leads him to conclude that the defensive measures enacted by Meta have not significantly altered the underlying vulnerability or the frequency of successful attacks. The problem persists largely unabated, indicating a potential gap between the security measures implemented and the evolving sophistication of the attackers targeting the platform's users, particularly businesses.

The Rising Specter of AI in Scams

Adding another layer of complexity, Mr Borchgrevink expresses concern about the increasing role of artificial intelligence (AI) in facilitating these scams. He believes the predicament might deteriorate significantly as fraudsters increasingly utilise AI tools to enhance the credibility and effectiveness of their malicious communications. AI can generate highly convincing phishing emails, messages, and even potentially fake support interfaces that are much harder for the average user to distinguish from legitimate Meta communications. This technological advancement arms scammers with more sophisticated tools for social engineering, potentially lowering the barrier to entry for carrying out convincing attacks and increasing their success rate. The arms race between platform security teams and cybercriminals is constantly evolving, and the integration of AI by malicious actors represents a significant new challenge in protecting users and their valuable digital assets on platforms like Facebook plus Instagram.

Sophisticated Impersonation Tactics

Mr Borchgrevink provided further insight into the methods employed by these cybercriminals. He explained to the BBC how con artists are frequently the perpetrators behind these business account lockouts. A frequently used and effective tactic involves impersonating official representatives from customer assistance from Meta itself. They initiate contact, often via email, pretending to represent "Meta Support." These fraudulent communications typically allege that the targeted business has violated platform rules, such as infringing copyright or breaching stipulations and rules in a particular manner. The message insists the enterprise must urgently verify its identity or account details to avoid suspension or permanent closure. These emails often incorporate official-looking Facebook logos and adopt a tone of authority, making them appear highly believable to unsuspecting recipients caught off guard.

The Credential Theft Mechanism

The deception continues when the user attempts to comply with the fake verification request. The fraudulent message typically includes a link or button, urging the user to click to begin the verification process for their business page. However, this link does not lead to a legitimate Meta domain. Instead, it redirects the user to a meticulously crafted counterfeit Meta website, controlled entirely by the attackers. This fake site is designed to precisely mimic the appearance of the real login or verification portal. When the user attempts to "verify" by entering their credentials – typically their login identifier plus passcode - they are unwittingly handing this sensitive information directly to the criminals. The attackers capture these logins in real-time, granting them the access needed to hijack the associated business account. This method exploits user trust in the platform's branding and authority.

Targeting Personal Accounts First

Mr Borchgrevink also highlighted a specific strategic approach often employed by these fraudsters. They frequently target an individual's personal Facebook profile before attempting to compromise the associated business page. This tactic leverages the structural requirement within Meta's ecosystem: every Facebook business page must connect with at least one personal profile, which holds administrative privileges. The personal account, therefore, acts as a gateway to the more valuable business asset. By gaining command over the personal profile first - often through similar phishing techniques or by exploiting weaker personal security habits - the attackers secure the necessary administrative rights over the linked business page. This initial foothold makes the subsequent takeover of the business page significantly easier and harder to trace back immediately to an attack specifically targeting the business itself.

Weaponising Platform Policies

Once the attackers gain administrative control via the compromised personal account, they execute a multi-step plan to solidify their hold and hinder recovery. First, they typically access the business account's settings and reassign the crucial administrative rights away from the legitimate owner. These rights are transferred either to other accounts controlled by the scammers or to newly created fake profiles. This action effectively locks the rightful owner out of their own business page. Following this, the attackers often return their focus to the originally compromised personal account.

They deliberately post content that flagrantly violates Meta's community standards - commonly material related to terrorism or pornography. This action is designed to trigger Meta's automated content moderation systems, leading to the swift disabling or suspension of the personal account. This strategic disabling cripples the legitimate owner's ability to use their primary profile to contest the hijacking or regain control of either the personal or the business account, creating a significant recovery roadblock.

Lockouts Without Malicious Hacking

Intriguingly, the BBC learned that businesses can lose entry to their presences on Facebook plus Instagram even in the absence of a direct hack by external cybercriminals. Platform errors or policy enforcement quirks can also lead to devastating lockouts. One illustrative case involved a small business operating as part of a larger franchise network. This particular enterprise informed the BBC how they were unexpectedly denied full entry to their established Facebook account. The trigger, paradoxically, was a positive development elsewhere in the franchise system: another franchisee successfully obtained blue-tick verification for their own page. As an unintended consequence of this verification, the platform's systems automatically flagged the reporting business's legitimate page as being a duplicate or "clone" account. This algorithmic decision resulted in the suspension or removal of their page, despite it being authentic and actively managed, highlighting potential flaws in automated identity verification processes.

Unjustified Account Closures

Simultaneously, other business users report instances where Meta appears to have wrongly closed or restricted fully compliant business accounts, causing significant disruption. Chetha Senadeera, a digital marketer, shared such an experience. During the autumn of the previous year, he discovered a Facebook profile that he actively managed for a client, a mobile financial institution named MyTU, had inexplicably gone missing. Describing the event, Mr Senadeera stated this profile had simply disappeared without any preceding warning or notification. Not him nor any other authorised team members received alerts regarding policy violations or impending action. The profile was functional one day and entirely gone the next. The abruptness and lack of communication created immense confusion and concern. He likened the experience to the page having been almost "kidnapped" – vanishing without a trace or explanation from the platform holders.

A Vital Gateway Silenced

The vanished Facebook page served a critical function for MyTU, a bank headquartered in Lithuania. It acted as an essential gateway for communicating with and acquiring customers across various European markets. The sudden loss of this established channel represented a significant blow to their marketing and customer service operations. Mr Senadeera recounted his subsequent interactions with client assistance representatives employed by Meta, Facebook's parent company. He claims these agents expressed bafflement regarding the situation. According to his report, the support staff confirmed they could still view the profile within Meta's internal systems. However, they also indicated the profile was subjected to restrictions, and crucially, they stated they lacked the authority or technical capability to unblock it or reinstate its public visibility. This interaction painted a picture of internal confusion or procedural roadblocks preventing resolution even when acknowledged by support staff.

Ongoing Stalemate and Disputed Violations

Six months have passed since the MyTU page disappeared, yet the situation remains unresolved. The page continues to be locked and inaccessible to the public and its administrators. Meta provided the BBC with its official rationale for the page's removal. The company stated the profile was taken down due to violations of its established policies concerning scams. Specifically, Meta indicated that its automated systems had detected a potentially harmful link present upon the profile, triggering the enforcement action. However, Mr Senadeera strongly disputes this justification. He firmly asserts that the company has never disseminated material considered damaging or deceptive through the page. He maintains their activities have always been compliant with platform rules. This standoff highlights a critical area of friction: businesses feeling wrongly accused by opaque automated systems with limited recourse for appeal or correction.

The Call for Enhanced Platform Responsibility

Mr Senadeera argues forcefully that Meta must significantly improve its processes and response times for assisting businesses in regaining entry to their profiles on Facebook plus Instagram. This call for action extends to all scenarios, encompassing both verified victims of fraudulent hacking activities and businesses, like MyTU, who consider themselves erroneously penalised by the platform itself. He stresses the urgency required, given the vital role these platforms play in modern business operations. Whether facing external threats from cybercriminals or internal issues stemming from platform errors or policy misunderstandings, businesses require clearer communication, faster resolutions, and more accessible, empowered support channels from Meta. The current situation, characterised by long delays, automated responses, and apparent internal limitations, falls short of the support level businesses argue they deserve, given their reliance on and investment in Meta's ecosystem.

Do you want to join an online course
that will better your career prospects?

Give a new dimension to your personal life

whatsapp
to-top