NewsAI & DevelopmentSecurity

Instagram API Breach Exposes 17.5M Users via Scraping Attack

Instagram data breach visualization showing API security vulnerability and dark web data leak
Instagram API breach exposed 17.5M users through rate limiting bypass

A hacker published data from 17.5 million Instagram users on the dark web last week, exposing usernames, email addresses, phone numbers, and partial physical addresses. Discovered by Malwarebytes on January 7, the breach wasn’t a system hack—it was an API scraping attack that bypassed Instagram’s rate limiting by exploiting a 2024 API vulnerability. For developers, this is a wake-up call: old API security debt doesn’t disappear, it leaks quietly years later.

The Attack: How Rate Limiting Failed

The hacker, operating under the alias “Solonik,” published the dataset on BreachForums for free, offering 17.5 million user records in JSON and TXT formats. The data wasn’t stolen through a direct system breach—Instagram’s infrastructure remained intact. Instead, attackers exploited API endpoints in late 2024, bypassing Instagram’s 200 requests-per-hour rate limit through IP address rotation, multiple account creation, and request timing manipulation.

Instagram reduced its API rate limits by 96% in 2025 to 200 calls per hour per user token. Yet this dataset proves that volume-based rate limiting alone is security theater. Attackers distributed requests across hundreds of IP addresses and accounts, staying under each individual threshold while collectively harvesting millions of records.

Why This Matters for Developers

This breach exposes a fundamental flaw in API security thinking. Rate limiting is necessary, but not sufficient. If you’re relying on 200 requests per hour as your primary defense, you’re one IP rotation away from a data leak. The Instagram incident shows three critical lessons:

  • Behavioral anomaly detection trumps volume limits. Monitoring request patterns across IP addresses and accounts can flag coordinated scraping attacks.
  • Minimal data exposure is non-negotiable. The leaked JSON files suggest API responses included unnecessary fields. Every field in your API response is a potential leak vector.
  • API security debt compounds over time. This vulnerability existed in 2024, leaked in 2026, and might still be impacting users we don’t know about yet.

User Impact and the Password Reset Flood

Instagram users worldwide received waves of unsolicited password reset emails starting January 10, as attackers used the leaked email addresses to test which accounts were active. The emails are legitimate Instagram messages, but they’re being triggered by cybercriminals—a clever social engineering tactic.

The risks are immediate: phishing attacks using leaked personal data, account takeover attempts via password resets and SIM swapping, and long-term identity theft. If you’re an Instagram user, enable two-factor authentication with an authenticator app (not SMS), change your password, and review active devices in your account settings.

Meta’s Response Rings Hollow

Meta denied any breach, claiming the password reset flood was caused by a “technical issue” that allowed external parties to trigger reset emails. The company insists “no breach of our systems occurred” and “Instagram accounts are secure.” But this semantic dodge misses the point. Whether you call it a breach, a leak, or an API scraping incident, 17.5 million users’ personal data is now on the dark web. That’s a security failure, full stop.

Meta hasn’t answered critical questions: If no breach occurred, how did “Solonik” obtain 17.5 million structured records? Why wasn’t the API scraping detected in real-time? A separate leak exposed 489 million Instagram records in November 2024, suggesting systemic rather than isolated vulnerabilities.

The Value of Dark Web Monitoring

Malwarebytes discovered this breach during routine dark web scanning, catching the leak before Meta made any public statement. Dark web monitoring tools like SOCRadar, Searchlight Cyber, and Digital Shadows scan marketplaces and forums for exposed credentials. For individuals, services like Have I Been Pwned provide free breach alerting.

The irony: Google shut down its consumer Dark Web Report feature in mid-January 2026, the same month this Instagram leak went public, creating a gap in accessible monitoring just when it proved most valuable.

What Developers Should Do Now

Audit your APIs from 2024 and earlier. Security vulnerabilities don’t expire—they leak years later. Implement multi-layered rate limiting combining IP-level, account-level, and global thresholds. Deploy behavioral anomaly detection to flag coordinated attacks. Apply minimal data exposure principles—only return fields absolutely required. Consider adding dark web monitoring to your security stack.

The global average cost of a data breach hit $4.88 million in 2024, excluding reputational damage or regulatory fines. API security debt compounds like financial debt—pay now by securing your systems, or pay exponentially more later when the leak goes public.

The Bottom Line

Old API vulnerabilities never die, they just leak quietly. Instagram’s rate limiting protected against casual abuse but collapsed under a coordinated attack using basic evasion techniques. For developers, defense in depth isn’t optional. Layer your controls, monitor for behavioral anomalies, minimize data exposure, and assume your 2024 code will be tested by attackers in 2026. For Instagram’s 17.5 million affected users, the damage is done—but the rest of us can learn from their exposure before it happens to our systems.

ByteBot
I am a playful and cute mascot inspired by computer programming. I have a rectangular body with a smiling face and buttons for eyes. My mission is to simplify complex tech concepts, breaking them down into byte-sized and easily digestible information.

    You may also like

    Leave a reply

    Your email address will not be published. Required fields are marked *

    More in:News