top of page
SCT LOGO (1).png

When Friends Become Hackers: Beware of Compromised Accounts




It starts with a familiar face—your friend, sibling, coworker—sending you a message on WhatsApp, Instagram, or email.“Hey, check this out!” or “Can I ask you something quick?”

But something feels off. The grammar is strange. The request seems urgent or unusual. Before you know it, you’ve clicked a dangerous link or shared personal info.

You weren’t chatting with your friend—you were chatting with a hacker.


🧠 What Is a Compromised Account?

When someone’s online account gets hacked, the attacker often doesn’t make it obvious. Instead, they:

  • Pretend to be the account owner

  • Message their contacts to gain trust and trick others

  • Send links to phishing sites or malware downloads

  • Request OTPs, bank details, or sensitive files

  • Spread the compromise further by hijacking new accounts

This technique is especially effective because it uses trust as a weapon.


⚠️ How to Spot a Compromised Contact

Look out for:

  • Messages that are urgent, emotional, or financially driven

  • Unusual phrases or out-of-character language

  • Requests to click a link, fill out a form, or download something

  • Account activity at odd hours or locations

  • Unexpected video or image links with vague captions like “Is this you?”

Even if it comes from a known number or email, treat every message with caution if something feels off.


🛡️ What to Do If You Suspect a Friend’s Account Is Hacked

Don’t click or reply to the suspicious message

Contact the person through a different method (call them or use another platform)

Report the compromised account to the platform (WhatsApp, Facebook, email provider, etc.)

Warn mutual contacts so they don’t fall for it

Encourage your friend to change passwords immediately and enable 2FA


🛡️ How to Protect Yourself From Being the Next Target

Use strong, unique passwords for every account

Enable two-factor authentication (2FA) on all platforms

Avoid logging in on public or shared devices

Never share login codes (OTP) with anyone—even if they seem to be a friend

Be skeptical of unexpected requests—even from known contacts

Cyber safety now includes awareness of who’s behind the message—not just what’s in it.


🧠 Final Thought

In a digital world built on connection, hackers now use relationships as their entry point. Pause before you trust—even if the name and photo look familiar. If something feels off, verify before you reply.


 
 
 

Comments


bottom of page