In a post titled How I could Have Hacked Any Instagram Account, Muthiyah explains that while Instagram uses a link on the web, the mobile recovery process is less secure. Users are instead sent a text with a six-digit passcode, which logs them in when received. Six numbers mean a million different combinations, which would be impossible to do manually, but isn’t too difficult with automation and the right tools. Instagram’s 2FA stopped a single IP address from trying more combinations after 250. By using 1000 IP addresses at once, Muthiyah was able to successfully show how to crack the system before the time out of 10 minutes. He was able to send 200 requests from each IP for a total of 1000 machines for 200,000 requests. Naturally, that’s more than most would be willing to pay for Instagram account access. However, when you consider some of the important users on the platform, it’s not that much. An attacker could have compromised the account of Donald Trump, Elon Musk, or the Bank of America to push scam links to users. Thankfully, Muthiyah disclosed the information to Facebook, who fixed the issue quickly after some additional information. In 2015, Laxman also found flaws in Facebook that let him delete any photo and view any private picture.

Researcher Exploits Instagram s Account Recovery 2FA to Access Any Account - 20Researcher Exploits Instagram s Account Recovery 2FA to Access Any Account - 87Researcher Exploits Instagram s Account Recovery 2FA to Access Any Account - 57Researcher Exploits Instagram s Account Recovery 2FA to Access Any Account - 73Researcher Exploits Instagram s Account Recovery 2FA to Access Any Account - 68