Experts in the field of high technologies told DEA News that account security on social networks blocked in Russia is likely to face increasing attempts at compromise. The trend, observed by specialists in recent months, signals that cyber actors are refining their methods to gain access to accounts that belong to users across various regions, and it is expected to persist as long as the current global climate continues to influence online activity and trust. This is not merely a question of privacy; it touches the core functionality of social platforms, the integrity of user data, and the ability of legitimate users to control their own digital identities.
Denis Kuvikov, who directs the regional engineering center of the National Technology Initiative’s SafeNet program, points out that attackers can wield compromised accounts to perform a range of harmful acts beyond data theft. He notes that hijacked profiles can become vehicles for spreading misinformation, launching targeted harassment campaigns, or coordinating actions that disrupt normal online discourse. The breadth of potential misuse is expanding as attackers adapt to evolving security defenses and new social engineering tricks, making ongoing vigilance essential for both individuals and organizations that rely on these networks for communication, marketing, or collaboration.
Ruslan Permyakov, Deputy Director of NTI Competence Center “Trusted Interaction Technologies” based at TUSUR, highlights a clear financial incentive behind many of these schemes. Scammers are increasingly motivated by monetizing access, whether through reselling compromised credentials, running fraudulent campaigns, or exploiting users who neglect basic protective measures. This reality makes cybersecurity education crucial: users should understand not only how to protect their accounts, but also how to detect suspicious requests, unusual login activity, and other telltale signs of unauthorized access that may indicate a breach is underway.
Permyakov adds that, given the current global conditions, social networks are seeing renewed pressure from attackers who leverage profiles with a history to bolster the credibility of their fraud attempts. In this environment, new fraud schemes are being designed to exploit present vulnerabilities, and individuals must assume a proactive stance. The message from security professionals is consistent: anticipate risks, implement layered defenses, and maintain a habit of verifying requests that seem urgent or unusual, especially those that ask for sensitive information or access to other accounts.
For those who choose not to delete compromised or unused accounts, specialists advise a concrete set of protective steps. Start by closing public visibility of profiles so that unauthorized observers cannot glean information about your network or routines. Next, replace old passwords with strong, unique combinations that are not used anywhere else, and enable two-factor authentication whenever possible to add a robust barrier against unauthorized logins. It is also prudent to link accounts to a mail domain that is controlled by the user, rather than a domain that could be compromised more easily. These practices create multiple layers of defense, making it progressively harder for intruders to maintain access even if one credential is compromised.
In a related development, there was a notable legal decision in Moscow on March 21, when the Tverskoy Court formally recognized the American company Meta as an extremist organization in the eyes of Russian authorities. This ruling led to bans on the use of Facebook and Instagram within the country, with the Prosecutor General’s Office arguing that Meta permitted calls for violence against Russian forces in Ukraine. The decision reflects the intense political and legal landscape that surrounds global tech platforms, and it underscores how geopolitical factors can shape the availability and use of widely adopted social networks. The outcome has immediate implications for users who rely on these services for communication, business, and information sharing, as well as for the broader dialogue about online safety, censorship, and digital rights in different regulatory jurisdictions.