Data BreachesJanuary 11, 20264 min read

Meta Denies Breach as 17.5M Instagram Records Fuel Password Reset Attacks

Scraped data from 2024 API misconfiguration resurfaces on dark web. Attackers weaponize leaked emails to flood users with legitimate password reset requests.

Sarah Mitchell

Meta issued a statement Friday denying that a breach exposed 17 million Instagram accounts, even as users worldwide reported waves of unsolicited password reset emails flooding their inboxes. The company acknowledged fixing a technical issue that allowed external parties to trigger password resets but maintained that its systems were not compromised.

The incident traces back to data scraped through a misconfigured Instagram API in 2024. That dataset—containing usernames, email addresses, phone numbers, and physical addresses—resurfaced on BreachForums on January 7, 2026. Attackers quickly weaponized the leaked contact information to bombard affected accounts with legitimate password reset requests.

What Happened

Malwarebytes Labs first identified the data dump posted by a user named "Solonik" on BreachForums. The dataset includes 17.5 million records in JSON and TXT formats, apparently extracted from Instagram's API approximately 18 months ago.

Unlike typical credential leaks, this dump doesn't include passwords. The scraped data consists of:

  • Usernames
  • Real names
  • Email addresses
  • Phone numbers
  • Physical addresses (where available)

Starting around 4 AM EST on January 8, Instagram users across multiple countries began reporting password reset emails they never requested. The emails were legitimate—sent by Instagram's actual authentication system—but triggered by attackers using the leaked email addresses.

The attack exploits Instagram's "Forgot Password" feature. With millions of valid email addresses in hand, attackers used automated tools to submit mass password reset requests. Each request generates a real email from Instagram, making the messages difficult to distinguish from legitimate account recovery attempts.

Meta's Response

Meta released a statement emphasizing that no breach occurred: "We fixed an issue that let an external party request password reset emails for some people. There was no breach of our systems and your Instagram accounts are secure."

The company characterized the password reset flood as a technical bug rather than a security incident. The "issue" allowed bulk requests without adequate rate limiting, enabling attackers to trigger thousands of reset emails per minute using the scraped data.

Meta's framing is technically accurate—the scraped data came from an API misconfiguration, not a system breach. But for affected users, the distinction feels academic. Their personal information was exposed, and now they're receiving suspicious emails that look exactly like legitimate Instagram communications.

Why the Password Reset Flood Matters

The attack demonstrates how scraped data can be weaponized months or years after initial collection. Even without passwords, attackers can:

  1. Conduct credential stuffing - Test email/password combinations from other breaches against Instagram
  2. Launch phishing campaigns - The reset email flood conditions users to interact with Instagram-related messages
  3. Enable SIM swapping - Phone numbers in the dump facilitate attacks to port victims' phone numbers
  4. Build social engineering profiles - Names and addresses support impersonation and targeted attacks

The legitimate password reset emails also serve as a smokescreen. Buried among dozens of authentic reset requests, a well-crafted phishing email becomes harder to spot.

Protection Recommendations

If you received unexpected Instagram password reset emails this week:

  1. Don't click links in the emails - Navigate directly to Instagram's app or website to check your account
  2. Change your password manually - Go through the app, not email links
  3. Enable two-factor authentication - Use an authenticator app rather than SMS (the leaked phone numbers make SMS 2FA less secure)
  4. Check active sessions - Review logged-in devices in Instagram settings and revoke any you don't recognize
  5. Watch for phishing - Attackers may follow up with fake security alerts or account recovery messages

The Scraping Problem

This incident joins a pattern of social media platforms struggling with API-based data harvesting. Facebook faced similar issues with datasets scraped in 2019 and 2021. LinkedIn, Twitter, and other platforms have experienced comparable incidents.

The data persists indefinitely once collected. Instagram can fix the API misconfiguration, but the 17.5 million records already exist and will continue circulating through underground marketplaces for years. Each time the data resurfaces, new attacks become possible.

Meta's denial focuses narrowly on whether its current systems were breached. That's the wrong question for affected users. Their data was exposed—whether through breach, scraping, or misconfiguration—and now they're dealing with the consequences.

Related Articles