How To Hack Facebook Account Just By Knowing Phone Number

Resources
  • Webinars
  • Awards
  • Free eBooks
About Site
  • About THN
  • Jobs
  • Advertise with us
Contact/Tip Us Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media RSS Feeds Email Alerts Security Service Edge How to Hack Facebook Account Just by Knowing Phone Number Swati KhandelwalJun 15, 2016 how-to-hack-facebook-account Hacking Facebook account is one of the major queries on the Internet today. It's hard to find — how to hack Facebook account or facebook messenger, but researchers found a way that can allow someone to hack Facebook account passwords with only the target's phone number and some resources. Yes, your Facebook profile can be hacked, no matter how strong your password is or how much extra security measures you have taken. No joke! Hackers with resources to exploit SS7 network can hack your Facebook login and all they need is your phone number. The weaknesses in the part of global telecom network SS7 that not only let hackers and spy agencies listen to personal phone calls and intercept SMSes on a potentially massive scale but also let them hijack social media accounts to which you have provided your phone number. SS7 or Signalling System Number 7 is a cell phone signaling protocol that is being used by more than 800 telecommunication operators worldwide to exchange information with one another, cross-carrier billing, enabling roaming, and other features. However, an issue with the SS7 network is that it trusts text messages sent over it regardless of their origin. So, malicious hackers could trick SS7 into diverting text messages as well as calls to their own devices. All they need is the target’s phone number and some details of the target’s device to initiate the silent snooping. The researchers from Positive Technologies, who recently showed how they could hijack WhatsApp and Telegram accounts, now gave the demonstration of the Facebook hack using similar tricks, Forbes reported. SS7 has long been known to be vulnerable, despite the most advanced encryption used by cellular networks. The designing flaws in SS7 have been in circulation since 2014 when the team of researchers at German Security Research Labs alerted the world to it.

Here's How to Hack Any Facebook Account:

The attacker first needs to click on the "Forgot account?" link on the Facebook.com homepage to reset your password. Now, when asked for a phone number or email address linked to the target account, the hacker needs to provide the legitimate phone number. The attacker then diverts the SMS containing a one-time passcode (OTP) to their own computer or phone, and can gain access to the target’s Facebook account. The issue affects all Facebook users who have registered a phone number with Facebook and have authorized Facebook Texts. Besides Facebook, researchers' work shows that any service, including Gmail and Twitter, that uses SMS to verify its user accounts has left open doors for hackers to target its customers. Although the network operators are unable to patch the hole sometime soon, there is little the smartphone users can do.
  • Do not link your phone number to social media sites, rather rely solely on emails to recover your Facebook or other social media accounts.
  • Use two-factor authentication that does not use SMS texts for receiving codes.
  • Use communication apps that offer "end-to-end encryption" to encrypt your data before it leaves your smartphone over your phone's standard calling feature.
However, the important thing to note is that the issue has actually nothing to do with Facebook security or other website's security, instead it is the weakness in the telecom network.
"Because this technique [SSL exploitation] requires significant technical and financial investment, it is a very low risk for most people," Facebook spokesperson told The Hacker News.
"As an added precaution, we recommend turning on two-factor authentication, called Login Approvals, in your Facebook security settings. Doing this will disable recovery via SMS on your account so even if someone has your phone number, they'll still need your password to access your account."
Update: If you think this technique is old and can not be used to hack your social media, bank or any online accounts, then you are mistaken. A real-world SS7 attack has been spotted this month when some unknown hackers exploited the design flaws in the Signaling System 7 (SS7) to drain victims' bank accounts. Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post. SHARE Tweet Share Share Share Share on Facebook Share on Twitter Share on Linkedin Share on Reddit Share on Hacker News Share on Email Share on WhatsApp Facebook MessengerShare on Facebook Messenger Share on Telegram SHARE Facebook account hacking, Facebook hacking, gmail hacking, hacking news, How to Hack Facebook, interception, Signaling System 7, sms hacking, SS7, SS7 Protocol, twitter hacking Trending News
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack and Vibe-Coded Malware
⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack and Vibe-Coded Malware
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine and More
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine and More
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues
OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues
Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model
Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday
APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday Popular Resources
Articles
Self-Hosted WAF: Block SQLi, XSS, and Bots Before They Reach Your Apps
Articles
19,053 Confirmed Breaches in 2025 – Key Trends and Predictions for 2026
Articles
Read CYBER360 2026: From Zero Trust Limits to Data-Centric Security Paths
Articles
Identity Controls Checklist: Find Missing Protections in Apps

Cybersecurity Webinars

Hidden Attack Paths You’re Missing

Learn to Find Hidden Vulnerabilities in Autonomous AI Agents

A practical deep dive into securing AI agents against real-world attack paths beyond the model itself.

Register Pressure-Test Your Defenses

Automate Security Posture Validation with CTI-Driven Testing

See exactly where your controls stand against today’s threats—automated, accurate, approachable.

Register Latest News Cybersecurity Resources CybersecurityZero Trust + AI: Thrive in the AI Era and Remain ResilientZero Trust Everywhere - protection across your workforce, branches, and clouds, and GenAI.. CybersecurityStop AI-Powered Threats and Protect Sensitive Data with Zscaler Zero Trust + AICompanies must replace legacy firewalls, VPNs, and exposed IPs with a Zero Trust + AI security model to protect AI usage and stop AI-driven attacks. CybersecurityEarn a Master's in Cybersecurity Risk ManagementLead the future of cybersecurity risk management with an online Master’s from Georgetown. ​ Expert Insights Articles Videos Expert Insights

Why CVSS Scores Don't Tell the Real Story of Risk

March 9, 2026 Read ➝ Expert Insights

AI SOC Investigation Has Moved Beyond Triage: Two Cases That Show Where It Actually Matters

March 2, 2026 Read ➝ Expert Insights

AI in Cybersecurity: Is It Worth the Effort for Lean Security Teams?

March 2, 2026 Read ➝ Expert Insights

Demystifying Key Exchange: From Classical Elliptic Curve Cryptography to a Post-Quantum Future

March 2, 2026 Read ➝ Get Latest News in Your Inbox

Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.

Email

Tag » How To Hack Facebook Messenger