Blog

Your Facebook Account Has Been Hacked? Here’s What to Do

In the unfortunate event of your account being compromised, here's a list of steps to help you resecure it...

In the unfortunate event that your account is compromised, here is a list of steps that can be taken to assist you in resecuring your account:

Step 1

The first thing to do is to take a deep breath and verify that your account has, in fact, been hacked. Try logging into your account with your username and password, make sure you enter the information correctly and Caps Lock is off.

If you can log in, this does not necessarily mean you haven’t been hacked. Just that the situation isn’t nearly as bad as you thought it was. The next step is to change your password using the reset password function. See the “Passwords. Storing them, creating them, and using many of them” of this blog to learn how to create a good password. Once you have reset your password, log out of all sessions to revoke the access anyone has to your account without your permission. You force them to attempt to log back into your account using your new password which, in theory, they should be unable to do.

At this point, if not already in place, set up 2-Factor Authentication on your account to drastically reduce the odds of something like this happening again!

Note: This will not work if your email has been compromised. However, the same methodology can be applied to reset your email password and log all users out of your email account (for example Gmail, Outlook, Hotmail, etc.). Remember to also implement the use of a 2-Factor authentication for your email account to ensure that it is secure.

Step 2

If step one did not work then your situation is quite severe. Keep calm and read on.

At this point, immediately change your passwords to any other accounts you might have, especially if they share a password with your Facebook account as the attacker may target these next.

Unlink your Facebook account from any services you have used to sign into or any other links you may have created. If you used it to sign into, for example, a shopping website or you connected any of your bank cards you need to contact these institutions immediately and disconnect them to prevent the attacker from abusing these links.

Step 3

After changing your other passwords, you can notify Facebook that you believe your account has been hacked. This step however requires a lot of patience. In the meantime, adhere to the following steps.

Step 4

Let your friends and family know that you have been hacked. A common occurrence, once an account has been hacked, is for the attacker to use your account to phish (through infected messages and links) your Facebook friends. Other forms of attacks that can be conducted are achieved by them impersonating you such as messaging your family and asking for sensitive information or money. By warning your friends as soon as possible you minimize the chances of them falling victim to an attack using your account.

Step 5

Here is a list of steps to take when attempting to recover your account through Facebook’s services in the event that it is hacked.

Using the Wi-Fi you have normally used in the past, visit the following link. Locate your account by searching for your phone number, email address, name, or username. You can find your username by going to your profile or asking a friend to go there and checking the URL bar. It should show something like “facebook.com/your username.”
Send a recovery code to your phone or email address. In the event you don’t have access to the number and address listed, select “No longer have access to these?” and “Cannot access my email.”
Reset your email address. If not you need to go here and choose “my account is compromised.” Enter your old password, choose “secure my account,” and select “I cannot access these.” If this is also not working, open the Facebook app on your mobile device and try logging in there, and select “forgot password.” Click the button indicating you no longer have access to the phone number and email address associated with the account. If the application gives you access, reset your email address.
After these steps, you reach a point where you submit a photo of yourself along with your ID. The photo needs to be high quality, in-frame, and clearly visible. Facebook should then send you an email using the new address you registered allowing you to reset the password.

However, if the hacker that hijacked your account set up 2-Factor Authentication you will still be unable to access the account and will need to fill out another form with another photo of you with your ID. Should this be successful a link and code will be sent to the same newly registered email you attached in the step before this one. Using the link or code you can bypass the hacker’s control over your account and gain access. Immediately head over to the privacy settings and then to “Contact” and disconnect any email accounts and/or phone numbers that are not yours. Next, log out of all sessions, update your password and enjoy your account once again.

Step 6

If your account truly is compromised and you’ve been unable to regain control using Facebook’s services, then it’s time to decide if the account is truly worth it. By this point, everyone you know should have been made aware of your account being compromised and should have unfriended and blocked it. Also, your other accounts should have their credentials updated to avoid the attacker targeting those next. On top of all this, you should by now have isolated your account from important services such as your bank account. You need to ask yourself: “Do I really need this account back?” If the answer is yes and nothing else has worked so far, the next step will be to appoint third parties to help with your hacked account, for example, Hacked. They offer recovery services, bearing the burden so you don’t have to.

CYBER SECURITY INSTITUTE

Visit us at https://cybersecurityinstitute.co.za/

Email: csi@cybersecurityinstitute.co.za

Certificate in Cyber Security

Course Details

This practical, hands-on course focuses on establishing a foundation in Cyber Security by introducing candidates to cyber-crime, attack methods, and managing cyber risks.

Mode of Offering: The course is presented via facilitated    e-learning, utilising an e-learning platform and virtual classes.

Intended Audience:

This course is designed for individuals embarking on a career in Cyber Security or performing security functions.

Requirements

Applicants should have a Matric certificate or equivalent qualification with suitable IT knowledge, Internet access, and a PC or laptop on which applications can be installed and services accessed.

Costs:

R10,500 all inclusive

Duration:

6-months

Intake:

Applications are accepted throughout the year, with course starting dates in February, May, and August.

Course Overview:
Cyber-crime‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎
  • Introduction to cyber-crime
  • Cyber-attack methods (e.g., ransomware, sextortion, email fraud)
  • Cyber criminology (actors behind the attacks, criminal networks, state-sponsored entities, etc.)
  • Tracing the online trail
  • Dark web (criminal forums)
  • Case studies of attacks in SA & Global.
  • Crime-as-a-Service
  • Internet of (Criminal) Things.
Practical Cryptography
  • Introduction to cryptography.
  • Encryption and Decryption.
  • Hash functions
  • Blockchain
  • Virtual Currencies
  • Digital signatures
  • Digital certificates
  • Cryptographic Protocols (SSL, SSH, etc.)
Course Overview:
Cyber Governance, Risk & Compliance
  • Overview of cyber governance, risk, and compliance
  • POPIA & GDPR
  • Data Privacy
  • Policies in action
  • NIST, ISO27001
  • Controls
  • Planning for contingencies
  • Developing the security program
  • Risk analysis and management
Cyber Intelligence‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎
  • Introduction to Cyber Intelligence
  • Attack Tools
  • Attack process
  • Reconnaissance and Footprinting
  • OSINT services and tools
  • Threat and vulnerability feeds and assessments

Cyber Investigations

Course Details

This course is suitable for investigators and investigation teams within the corporate environment and public sectors who are required to track online trails or utilise tools to solve online crimes. It is also intended for professionals and investigative journalists involved in investigations such as fraud, espionage, data theft, and cyber vetting.

Mode of Offering: The course is presented via facilitated    e-learning, utilising an e-learning platform and virtual classes.

Intended Audience:

This course is designed for investigation officers, cyber-crime investigators, investigative journalists, etc.

Requirements

Applicants should have a Matric certificate or equivalent qualification. Although a formal IT qualification or certification is not required, some knowledge of computer systems would be beneficial. Internet access and a PC or laptop on which applications can be installed and services accessed are required.

Costs:

R10,500 all inclusive

Duration:

6-months

Intake:

Applications are accepted throughout the year, with course starting dates in February, May, and August.

Course Overview:
  • Reconnaissance
  • Online services and tools
  • Metadata Encryption & Decryption
  • Digital signatures
  • Online investigations
  • Crime Scene Management
  • Documenting evidence
  • Investigation Process
  • Chain of Evidence
  • Protocols and emails
  • URLs & DNS information
  • Timelines
  • Decryption and deciphering
  • Virtual Currencies
  • Cyber criminology
  • Introduction to the attack process
  • Introduction to attack vectors
  • Social networks (i.e., attacks via Facebook, Twitter, etc.)
  • Dark and hidden web
  • Threat actors
  • Data Collection
  • Social Media
  • OSINT
  • HUMINT
  • SOCMINT

Cyber Intelligence

Course Details

The main objective is to equip delegates with the necessary competencies and practical skills to assist in compiling an intelligence-driven cyber security strategy to provide proactive solutions to a plethora of cyber threats.

Mode of Offering: The course is presented via facilitated        e-learning, utilising an e-learning platform and virtual classes.

Intended Audience:

This course is designed for persons responsible for the security function, CISOs, as well as Data Protection Officers.

Requirements

Applicants should have a Matric certificate or equivalent qualification. Although a formal IT qualification or certification is not required, some knowledge of computer systems would be beneficial. Internet access and a PC or laptop on which applications can be installed and services accessed are required.

Costs:

R10,500 all inclusive

Duration:

6-months

Intake:

Applications are accepted throughout the year, with course starting dates in February, May, and August.

Course Overview:
  • Cyber Security Environment
  • Cyber Landscape
  • Cyber Threats and Exploits
  • Cyber Actors and Criminology Aspects
  • Obtaining Data
  • Sources of Data
  • Collection Operations
  • Applications, Tools, and Services
  • Analysis of Cybercriminals’ Modus Operandi
  • Analysis Techniques (Data to Information)
  • Indicators of Compromise
  • Cyber Intelligence
  • Intelligence Platforms, Applications, and Services
  • Data – Information – Intelligence
  • Intelligence Strategy
  • Incident Management
  • Cyber Warfare
  • Political and Commercial
  • Developing an Intelligence-Driven Strategy
  • Strategic and Tactical Intelligence Function
  • Risk Management

Cyber Governance

Course Details

Establishing a security strategy and defining a suitable implementation plan focused on managing cyber risks in a volatile and dynamic environment requires a solid understanding of the threat space and frameworks. This course unpacks cyber governance and approaches to manage risk and adhere to compliance regulations.

Mode of Offering: The course is presented via facilitated    e-learning, utilising an e-learning platform and virtual classes.

Intended Audience:

This course is designed for Managers and C-Suites responsible for security, Board members, as well as prospective leaders in the Cyber Security space.

Requirements

Applicants should have a Matric certificate or equivalent qualification. Although a formal IT qualification or certification is not required, some knowledge of computer systems would be beneficial. Internet access and a PC or laptop on which applications can be installed and services accessed are required.

Costs:

R10,500 all inclusive

Duration:

6-months

Intake:

Applications are accepted throughout the year, with course starting dates in February, May, and August.

Course Overview:
  • Security Management Program
  • Cyber-crime
  • Threat Environment
  • Cyber Criminology
  • Regulations – GDPR, POPI, Electronic Act, PCI-DSS
  • Skills Frameworks
  • Cyber Awareness Programs
  • Risk management
  • Controls – Choice, Implementation, and Management
  • Security Frameworks and Models
  • Policies and Procedures
  • Data Protection
  • The road to ISO 27001 Compliance and Certification

IT and Cyber Security Program

Course Details

Our courses combine essentials from both industry and academia to provide valid, unique, practical content that is innovatively presented via facilitated e-learning.

The IT and Cyber Security Program is a practical course consisting of coursework, virtual classes, and practical cyber range exercises.

Mode of Offering: Learning will be conducted through a facilitated online format, utilising an e-learning platform to provide an interactive and engaging educational experience. Additionally, hands-on practical sessions and virtual labs will be conducted every Friday from 9:00 AM to 12:00 PM, offering participants the opportunity to apply theoretical knowledge in a real-world context. This blend of online facilitated learning and scheduled virtual sessions aims to create a comprehensive and dynamic learning environment, ensuring a well-rounded educational experience for participants.

Intended Audience:

This course is designed for school leavers, those on a gap year, graduates looking to add industry credentials, and individuals looking to make a career change.

Requirements

Applicants should have a Matric certificate or equivalent qualification. Internet access and a PC or laptop on which applications can be installed and services accessed are required.

Costs:

R 31,350 all inclusive

Duration:

10-months

Intake:

24 February 2024

Course Overview:
IT Foundation for Cyber Security
  • IT Hardware Fundamentals
  • Network Fundamentals
  • Introduction to Operating Systems (Windows and Linux) 
  • Introduction to Cloud Computing (Office 365 and MS Azure) 
  • Protocols 
  • Technical Research and Writing
  • Algorithms and Problem Solving
  • File and Database Systems
  • Scripting
  • New Technologies: AI and Quantum Computing
  • Soft Skills
Certificate in Cyber Security
  • Cyber Security Fundamentals 
  • The Cybercrime Eco-System
  • Actors in Cyber Space – State and Non-State Actors
  • Cyber Incidents: Attacks, Breaches, and Espionage
  • Understanding Tactics, Techniques, and Procedures (TTPs) using the Mitre Attack Framework
  • Cryptography (Symmetric/Asymmetric/Hashes)
  • Secure Protocols
  • Reconnaissance and OSINT (Open-Source Intelligence)
  • Cyber Security Frameworks and Standards: Introduction to the NIST CS Framework and ISO 27000 Series
  • Cyber Risk Management, Cyber Governance, and the Implementation of Security Controls
Facilitated online course with virtual classes, and practical training and skills development on the cyber range platform.