How To Hack Facebook Account Just By Knowing Phone Number

Resources
  • Webinars
  • Awards
  • Free eBooks
About Site
  • About THN
  • Jobs
  • Advertise with us
Contact/Tip Us Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media RSS Feeds Email Alerts Security Service Edge How to Hack Facebook Account Just by Knowing Phone Number Swati KhandelwalJun 15, 2016 how-to-hack-facebook-account Hacking Facebook account is one of the major queries on the Internet today. It's hard to find — how to hack Facebook account or facebook messenger, but researchers found a way that can allow someone to hack Facebook account passwords with only the target's phone number and some resources. Yes, your Facebook profile can be hacked, no matter how strong your password is or how much extra security measures you have taken. No joke! Hackers with resources to exploit SS7 network can hack your Facebook login and all they need is your phone number. The weaknesses in the part of global telecom network SS7 that not only let hackers and spy agencies listen to personal phone calls and intercept SMSes on a potentially massive scale but also let them hijack social media accounts to which you have provided your phone number. SS7 or Signalling System Number 7 is a cell phone signaling protocol that is being used by more than 800 telecommunication operators worldwide to exchange information with one another, cross-carrier billing, enabling roaming, and other features. However, an issue with the SS7 network is that it trusts text messages sent over it regardless of their origin. So, malicious hackers could trick SS7 into diverting text messages as well as calls to their own devices. All they need is the target’s phone number and some details of the target’s device to initiate the silent snooping. The researchers from Positive Technologies, who recently showed how they could hijack WhatsApp and Telegram accounts, now gave the demonstration of the Facebook hack using similar tricks, Forbes reported. SS7 has long been known to be vulnerable, despite the most advanced encryption used by cellular networks. The designing flaws in SS7 have been in circulation since 2014 when the team of researchers at German Security Research Labs alerted the world to it.

Here's How to Hack Any Facebook Account:

The attacker first needs to click on the "Forgot account?" link on the Facebook.com homepage to reset your password. Now, when asked for a phone number or email address linked to the target account, the hacker needs to provide the legitimate phone number. The attacker then diverts the SMS containing a one-time passcode (OTP) to their own computer or phone, and can gain access to the target’s Facebook account. The issue affects all Facebook users who have registered a phone number with Facebook and have authorized Facebook Texts. Besides Facebook, researchers' work shows that any service, including Gmail and Twitter, that uses SMS to verify its user accounts has left open doors for hackers to target its customers. Although the network operators are unable to patch the hole sometime soon, there is little the smartphone users can do.
  • Do not link your phone number to social media sites, rather rely solely on emails to recover your Facebook or other social media accounts.
  • Use two-factor authentication that does not use SMS texts for receiving codes.
  • Use communication apps that offer "end-to-end encryption" to encrypt your data before it leaves your smartphone over your phone's standard calling feature.
However, the important thing to note is that the issue has actually nothing to do with Facebook security or other website's security, instead it is the weakness in the telecom network.
"Because this technique [SSL exploitation] requires significant technical and financial investment, it is a very low risk for most people," Facebook spokesperson told The Hacker News.
"As an added precaution, we recommend turning on two-factor authentication, called Login Approvals, in your Facebook security settings. Doing this will disable recovery via SMS on your account so even if someone has your phone number, they'll still need your password to access your account."
Update: If you think this technique is old and can not be used to hack your social media, bank or any online accounts, then you are mistaken. A real-world SS7 attack has been spotted this month when some unknown hackers exploited the design flaws in the Signaling System 7 (SS7) to drain victims' bank accounts. Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post. SHARE Tweet Share Share Share Share on Facebook Share on Twitter Share on Linkedin Share on Reddit Share on Hacker News Share on Email Share on WhatsApp Facebook MessengerShare on Facebook Messenger Share on Telegram SHARE Facebook account hacking, Facebook hacking, gmail hacking, hacking news, How to Hack Facebook, interception, Signaling System 7, sms hacking, SS7, SS7 Protocol, twitter hacking Trending News
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware and More
⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware and More
ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit and 15+ Stories
ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit and 15+ Stories
Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware
ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware
Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems
Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems
PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence
PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence
Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem
Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem
How Exposed Endpoints Increase Risk Across LLM Infrastructure
How Exposed Endpoints Increase Risk Across LLM Infrastructure Popular Resources
Articles
100+ Domains Multiply Attack Risk 6× - Download the CTEM Divide Research
Articles
Boost SOC Efficiency with AI-Guided Triage — Download Investigator Overview
Articles
Silent Residency Is the New Threat Model — Download the Red Report
Articles
Exposed Cloud Training Apps Are Letting Hackers In — Download the Research

Cybersecurity Webinars

Hidden Attack Paths You’re Missing

Learn to Find Hidden Vulnerabilities in Autonomous AI Agents

A practical deep dive into securing AI agents against real-world attack paths beyond the model itself.

Register Inside the Quantum Threat

Learn Quantum-Safe Practices to Stop Future Decrypt Attacks

Quantum computers could soon break today’s encryption—join Zscaler’s webinar to learn how post-quantum cryptography keeps your data safe for the future.

Register Latest News Cybersecurity Resources CybersecurityZero Trust + AI: Thrive in the AI Era and Remain ResilientZero Trust Everywhere - protection across your workforce, branches, and clouds, and GenAI.. CybersecurityStop AI-Powered Threats and Protect Sensitive Data with Zscaler Zero Trust + AICompanies must replace legacy firewalls, VPNs, and exposed IPs with a Zero Trust + AI security model to protect AI usage and stop AI-driven attacks. CybersecurityEarn a Master's in Cybersecurity Risk ManagementLead the future of cybersecurity risk management with an online Master’s from Georgetown. ​ Expert Insights Articles Videos Expert Insights

AI Won't Break Microsoft 365. Your Security Backlog Will

February 23, 2026 Read ➝ Expert Insights

The Riskiest Alert Types and Why Enterprise Soc Doesn’t Triage Them

February 23, 2026 Read ➝ Expert Insights

The Uncomfortable Truth About "More Visibility"

February 16, 2026 Read ➝ Expert Insights

AI Shouldn't Improve Workflows, It Should Replace Them. Here's How to Do It

February 16, 2026 Read ➝ Get Latest News in Your Inbox

Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.

Email

Tag » How To Hack Facebook Password