Meta Ads Account Hacked: What DTC Brands Should Do Immediately
When a Meta ads account is hacked, DTC brands need to act within hours to stop unauthorized spending, remove compromised access, secure all business assets, and begin the recovery process before the hackers can cause further damage or get the account disabled.
Last updated: February 2026Table of Contents
- Signs Your Meta Ads Account Has Been Hacked
- Step 1: Pause All Campaigns Immediately
- Step 2: Secure Your Personal Facebook Account
- Step 3: Review Business Manager Access
- Step 4: Contact Meta Support
- Step 5: Dispute Unauthorized Charges
- Step 6: Assess the Damage
- Step 7: Rebuild Security
- How Hackers Target DTC Ad Accounts
- Preventing Future Account Compromises
- FAQ
Signs Your Meta Ads Account Has Been Hacked
Detecting a hack quickly minimizes damage. Watch for these warning signs:
Immediate red flags:- Campaigns you didn't create appear in your Ads Manager
- Your ad budget depleted suddenly overnight
- Campaigns targeting unusual products, services, or geographic locations
- Payment method charges you didn't authorize
- Spending limits hit that you didn't set
- New admin users in Business Manager you didn't add
- Unusual login notifications from unknown devices or locations
- Meta security alert emails
- Two-factor authentication prompts you didn't trigger
- Email to your associated account about password changes you didn't make
Step 1: Pause All Campaigns Immediately
Before doing anything else, stop the bleeding.
How to pause all campaigns:- Open Meta Ads Manager
- Click the checkbox at the top of your campaigns list to select all
- Click the "Pause" button in the toolbar
- Confirm the pause
Step 2: Secure Your Personal Facebook Account
Meta Business Manager access is linked to personal Facebook accounts. If your personal account is compromised, your Business Manager is compromised.
Immediately:- Change your Facebook password to a strong, unique password you've never used elsewhere
- Enable two-factor authentication if it's not already on (Settings & Privacy > Settings > Security and Login > Two-Factor Authentication)
- Review and remove unknown active sessions (Settings > Security and Login > Where You're Logged In)
- Check for unfamiliar apps with access to your Facebook account and remove them
Step 3: Review Business Manager Access
After securing your personal account, audit who has access to your Business Manager.
Review these access points:- Business Settings > People: Remove any admin or employee accounts you didn't add
- Business Settings > Pages: Check for pages you don't own
- Business Settings > Ad Accounts: Review who has access to each ad account
- Business Settings > Partners: Check for partner connections you didn't authorize
Step 4: Contact Meta Support
After securing your accounts, report the breach to Meta.
How to contact Meta support:- Meta Business Help Center: business.facebook.com/help
- Meta's Hacked Account Recovery: facebook.com/hacked
- For business accounts with dedicated support: Your Meta account manager or via the "Chat" or "Email" support options in Business Manager
- The date and time you first noticed the unauthorized activity
- Names or email addresses of the unauthorized users you removed
- Details of the unauthorized campaigns (campaign IDs if available)
- Amount of unauthorized spend incurred
- Documentation of the hack (screenshots of unauthorized campaigns, access logs)
Step 5: Dispute Unauthorized Charges
Unauthorized charges from a hacked account may be refundable through Meta and through your payment provider.
Through Meta: Submit a dispute through Business Manager > Billing > Billing History. Select the unauthorized transactions and file a dispute. Provide your hack report reference number from Meta support. Through your bank or credit card: Contact your bank or credit card issuer and report the unauthorized charges as fraud. Most financial institutions have strong consumer protection for this scenario and can initiate a chargeback within 24 to 48 hours. This is often faster and more reliable than waiting for Meta's dispute process. Important: Filing chargebacks through your bank can sometimes trigger Meta to restrict the associated payment method or account. If your Meta relationship is important to your business, consider starting with Meta's internal dispute process first, escalating to your bank if Meta doesn't resolve within 7 to 10 days.Step 6: Assess the Damage
After securing and reporting, understand the full scope:
Financial damage: How much was spent without authorization? Which campaigns were run, to which destinations, at what spend? Account integrity damage: Did the hackers run policy-violating content (which can trigger account restrictions or disabling)? Check your Ad Account Quality score in Meta Business Manager. If unauthorized ads violated policies, you may need to appeal any resulting restrictions even though you weren't responsible. Business reputation damage: If the unauthorized ads ran with your brand's name or page association and contained misleading or inappropriate content, there may be audience trust implications. Monitor your page comments and direct messages for responses to unauthorized campaigns.Step 7: Rebuild Security
Before resuming normal ad operations, implement these security measures:
Two-Factor Authentication (2FA): Enable 2FA on every personal account that has access to your Business Manager. Require 2FA for all employees with Business Manager access. Spending limits: Set daily and account spending limits in Meta Billing. If a hacker compromises your account again, spending limits cap the damage. Access audit cadence: Schedule a monthly review of all users with access to your Business Manager. Remove anyone who no longer needs access. Separate business and personal: If you manage personal Facebook separately from business, use a separate email address for your business Meta account. This limits the surface area of any personal account compromise affecting your business. Enable Meta's security alerts: Business Settings > Security Center has options for security notifications and two-factor authentication requirements for all business users.How Hackers Target DTC Ad Accounts
Understanding attack vectors helps prevent recurrence:
Phishing emails: The most common attack vector. Fake emails that appear to be from Meta, warning of policy violations or account issues, directing users to a fake login page that captures credentials. Compromised employee accounts: If an employee with Business Manager access uses the same password across multiple platforms and that password is breached elsewhere, their Meta access is compromised. Malicious third-party apps: Facebook apps or browser extensions with excessive permissions can gain access to Business Manager credentials. Credential stuffing: Automated tools use previously leaked username/password combinations from other data breaches to attempt access to Meta accounts. Social engineering: Attackers posing as Meta support, agency partners, or collaborators request admin access to "fix" a fabricated problem.