March 13, 2026

The “Account Recovery” Scam: Why Your Friend’s Text Could Lock You Out

The Account Recovery Scam Why Your Friend's Text Could Lock You Out
Photo: Unsplash.com

A hacked profile from a friend can lock you out of your own account through a clever “Account Recovery” trick. In this scam, a contact sends a message asking for help to get back into their profile. They might say they need a “trusted friend” to receive a code for them. In reality, the attacker is triggering a password reset for your own account. When you share the code you received via text or email, you are actually giving the hacker the key to change your password and lock you out of your digital life.

How the Trusted Friend Scam Works

Social media platforms often have recovery features designed to help people who lose access to their emails or phone numbers. Scammers have figured out how to turn these helpful tools into weapons. The process usually begins with a message that feels very natural because it comes from someone you know.

The conversation often starts with a simple “Hey, are you there?” followed by a request for a quick favor. The “friend” explains that they are locked out of their account, and the platform told them to pick a friend to receive a recovery code. Because the message comes from a familiar profile, many people do not realize that the friend’s account has already been stolen by a hacker.

When you agree to help, the hacker goes to the login page of your account and clicks “Forgot Password.” They enter your username, and the platform sends a real security code to your phone. The hacker then asks you for that code. The moment you send it, they use it to reset your password, change the contact information, and kick you out of your own profile.

Why This Trick Is So Effective

This scam relies on “Social Engineering,” which is a fancy way of saying it tricks people using emotions like friendship and urgency. Most people want to help a friend in trouble. Because the code comes from a legitimate source, like Instagram, Facebook, or Google, it does not look like a traditional phishing link.

To make the scam even more convincing, attackers sometimes use tools like KFD Monitoring to keep track of active accounts or digital footprints. By knowing who you interact with most, they can pick the perfect “friend” profile to impersonate. This level of preparation makes the request feel even more believable.

What the Data Reveals

The scale of account takeover fraud is growing rapidly. According to security reports from early 2026, social engineering attacks involving account recovery tricks increased by 45% compared to the previous year.

A study conducted by cybersecurity researchers in late 2025 found that nearly 1 in 4 social media users had received a suspicious message from a “friend” asking for some form of security assistance. Even more concerning, the data showed that once an account is taken over, it is used to message an average of 50 more people within the first hour. This creates a “snowball effect” where one hacked profile leads to dozens of others.

Expert Davit Asatryan, a Vice President at Spin.AI, notes that these attacks are successful because they bypass traditional technical filters. He explains that since the communication happens between two “known” users on a trusted platform, security software often fails to flag the message as dangerous.

Direct Warnings from Security Experts

Law enforcement and security professionals have been raising the alarm about this specific tactic. Tony Burgess, a security expert at Barracuda Networks, points out that the “Account Recovery” trick is especially dangerous because it feels personal. He says that hackers are no longer just sending random emails; they are entering your social circle to find a way in.

“Never share a security code with anyone, even if they claim to be a close friend or a family member,” Burgess warns. He emphasizes that legitimate recovery codes are meant only for the person who receives them. If a friend truly needs help, they should use the platform’s official support channels rather than asking you to handle sensitive data.

Common Red Flags to Watch For

  • Unexpected Urgency: The “friend” says they need the code “right now” or they will lose their account forever.
  • Strange Language: The friend uses words or a tone that doesn’t sound like them.
  • The “Two-Step” Request: They first ask if you are available, and only then reveal the “favor.”
  • Platform Warnings: The text message containing the code often says, “Do not share this with anyone,” yet the scammer asks you to do exactly that.

How to Protect Your Profile

Staying safe does not require being a tech genius; it just requires a bit of caution. If a friend messages you with a strange request, the best thing to do is reach out to them through a different method, like a phone call or a different app, to see if it is really them.

Security Layer Recommended Action
Two-Factor (2FA) Use an app like Google Authenticator rather than SMS codes, as these are harder for scammers to manipulate.
Privacy Audit Hide your friend list so hackers cannot easily see who you are close to.
Verify Offline If a friend asks for a code, call them. A 30-second phone call can save your account.
Security Keys Use a physical security key for your most important accounts for the best protection.

If You Are Already Locked Out

If you have already shared a code and lost access, you must act fast. Go to the platform’s official “Hacked Account” page immediately. Most services have a way to reverse a password change if you act within the first few hours. Notify your bank if you use the same password for financial accounts, and tell your other friends that your profile has been compromised so they do not fall for the same trick.

This article features branded content from a third party. Opinions in this article do not reflect the opinions and beliefs of Kivo Daily.