Why millions got Instagram password reset emails but Meta says no hack
Reports of a 17 million account Instagram data leak triggered panic after users received unexpected password reset emails. Meta says there was no breach and the leaked data appears to be old, likely reused by cybercriminals. Here is what really happened and what users should do next.
New Delhi: Instagram users across the world woke up to a familiar panic this week. Password reset emails. SMS codes. Alerts that felt wrong. Social media quickly filled with screenshots and fear, with many asking the same question. Was Instagram hacked again.
The confusion grew after reports claimed data from more than 17 million Instagram accounts had been leaked online. Cybersecurity firms flagged it, hackers bragged about it, and users were left guessing. Instagram, owned by Meta, moved fast to deny any fresh breach. But the story, like most cyber incidents, is a bit messy and far from black and white.
So what actually triggered the alarm
The noise started after Malwarebytes warned users that cybercriminals had access to data from around 17.5 million Instagram accounts. The dataset was shared freely on hacking forums. The person posting it claimed it came from a 2024 Instagram API leak.
Soon after, Instagram users began reporting password reset emails they never asked for. That timing made things worse. Many assumed the leaked data and the password emails were connected.
Instagram later admitted there was a bug. A Meta spokesperson said, "We fixed an issue that allowed an external party to request password reset emails for some Instagram users.” Meta also said there was no breach and accounts remained secure.
That statement calmed some nerves, but raised new questions.
Is this really a new data breach
Short answer. There is no proof of a new breach.
Security researchers and journalists dug deeper. What they found suggests the leaked dataset is old. Very old in internet years.
Several researchers on X pointed out that the same data appeared on forums as early as 2023. Some say it traces back to scraping incidents from 2022 or even earlier. Meta told BleepingComputer it is not aware of any API compromise in 2022 or 2024.
Instagram has a history here. In 2017, a bug allowed attackers to scrape personal details from about six million accounts. It is still unclear if the current dataset is a mix of that leak plus newer public data.
What kind of data is floating around
The leaked file is big. Over 17 million records. But it is uneven. Some entries only have a username and ID. Others have more.
Here is a simple breakdown of what was found.
| Data type | Number of records |
|---|---|
| Instagram IDs | 17,015,503 |
| Usernames | 16,553,662 |
| Email addresses | 6,233,162 |
| Phone numbers | 3,494,383 |
| Names | 12,418,006 |
| Physical addresses | 1,335,727 |
Not every profile includes all this data. Many do not.
The dataset has now been added to Have I Been Pwned, which means users can check if their email appears in it.
Why those password reset emails mattered
Even if the data is old, the password reset flood was real.
Instagram confirmed it fixed a flaw that allowed someone to mass-request password reset emails. That does not mean attackers accessed accounts. It means they could trigger reset messages.
This kind of tactic often goes hand in hand with phishing. Attackers hope users panic, click fake links, or reply to scam messages pretending to be Instagram support.
Should you change your Instagram password
Instagram says there is no need. No passwords were leaked.
Still, being careful never hurts.
Here is what users should do.
- Ignore password reset emails you did not request
- Do not click links from unknown emails or messages
- Turn on two factor authentication if it is not already enabled
- Watch out for calls or texts asking for login codes
Attackers love recycled data. Even a five year old phone number can help them craft a convincing scam.
Why hackers exaggerate claims
Hackers lie. A lot.
One security analyst put it bluntly online. Threat actors inflate numbers to get attention. Bigger leaks mean more clout. More fear. Sometimes more buyers.
In this case, one hacker repackaged an old dataset and sold it as new. The sample data matched files shared years ago. It worked. Panic followed.

