Google tops the list of most exploited platforms in the US

3 Min Read

The foundation of our digital identity is our internet accounts, which are constantly targeted. Hackers are constantly looking for methods to access your data, whether it is through your social media accounts or your e-commerce login credentials, however they are more likely to target certain sites.

Unsurprisingly, consumers’ Google accounts are the most commonly hijacked online platforms, according to a recent study from Click Insight that examined search trends between November 2024 and October 2025.

It should come as no surprise that Google accounts are the holy grail for hackers since they are the key to unlocking a number of other native Google services. For this reason, there are more than 84,000 searches per month about “Google” account hacking.

maxresdefault

Now that Google is out of the way, Meta’s traditional heavyweight ranks second. According to search statistics, Facebook has 40,058 monthly queries, making it the second most abused site in the United States.

Roblox, the third most commonly breached platform in the US, is ahead of another Meta-owned behemoth in the top five.

RankPlatformAverage monthly hack-related searches
1Google84,038
2Facebook40,058
3Roblox35,675
4Instagram25,250
5Microsoft18,643
6Snapchat15,844
7Apple13,906
8Amazon9,092
9TikTok8,508
10Fortnite7,938

Given that almost 40% of Roblox users are younger than 13, it is not shocking that threat actors find the site to be an easy target. Conversely, Instagram (#4), one of the most widely used social media sites, is a veritable treasure for hackers who want to obtain much more than simply data.

Roblox and Instagram had 35,675 and 25,250 hack-related searches per month, respectively. With 18,643 monthly hack-related searches, Microsoft accounts complete the top five. Snapchat, Apple accounts, Amazon, TikTok, and Fortnite come next.

You need to go beyond simple passwords in order to stay safe online, regardless of the platform. Enabling 2FA authentication and using a password manager that supports passkeys is your best line of defense against threat actors.

Share This Article
Leave a Comment