Instagram Password Reset Email Glitch Hits Millions Amid 17.5M Data Leak Claims
Meta claims the recent Instagram password reset email wave was a fixed glitch, but new reports suggest 17.5 million accounts may have had their data leaked.
17.5 million users might be at risk. What Meta described as a harmless technical glitch regarding Instagram password reset email notifications is now facing intense scrutiny as conflicting security reports emerge.
Meta Denies Breach Despite External Reports
According to The Verge, Instagram recently addressed an issue where users were flooded with unauthorized password reset requests. Meta stated on X that an "external party" triggered the emails but insisted that there was no breach of its internal systems. However, security firm Malwarebytes paints a far more concerning picture.
Information on 17.5 million Instagram accounts, including usernames, physical addresses, phone numbers, and emails, has reportedly been compromised.
The Discrepancy in Security Statements
While Meta advises users to simply ignore the emails, the scale of the data reportedly found by Malwarebytes suggests a massive coordinated effort. Industry analysts suggest this could be a 'credential stuffing' attack where hackers use previously leaked data to gain access to active accounts, triggering the platform's automated security responses.
This content is AI-generated based on source articles. While we strive for accuracy, errors may occur. We recommend verifying with the original source.
Related Articles
North Korean hackers used ChatGPT, Cursor, and AI web tools to steal $12M in crypto in 90 days—without knowing how to code. What this means for cybersecurity's future.
Anthropic's AI cybersecurity model is reportedly available to the NSA and Commerce Department—but not to CISA, the agency responsible for defending US federal infrastructure. What that gap reveals.
After two months of bitter conflict, Anthropic and the Trump administration may be thawing—thanks to a new cybersecurity AI model. What does it mean when principle meets political pressure?
A disgruntled security researcher published working exploit code for three unpatched Windows Defender vulnerabilities. Hackers weaponized it within days. Here's what it means for everyone running Windows.
Thoughts
Share your thoughts on this article
Sign in to join the conversation