How to get into somebody instagram
How Instagram accounts get hacked: 6 tactics used by hackers
How many Instagram accounts get hacked a year?
According to Notch's data, an Instagram creator account gets hacked every 10 minutes on average - meaning over 50,000 creator accounts get hacked every year. The hacking figure for all accounts, not just creator accounts, is much higher.
Every year, cybercriminals generate over $3 billion in revenue from social media attacks alone and hacking constitutes a large portion of these malicious incidents.
To help influencers and business owners protect their Instagram accounts, below we breakdown 6 tactics hackers use to extract personal information and bypass 2-factor authentication.
{{learn-more}}
How do Instagram accounts get hacked?
How do hackers hack Instagram accounts? There are default security features on Instagram, like 2-factor authentication, so how can hackers overcome these?
The general answer to that question is, in most cases, some form of social engineering.
In this context, social engineering refers to the act of manipulating and deceiving Instagram users into willingly providing confidential information.
1. False copyright infringement messages
The tactic
Instagram clearly states that you can only share original content that doesn’t violate copyright infringement laws. That said, it’s possible for you to commit a copyright violation unintentionally, in which case Instagram would take action and reach out to correct the problem.
This has led to many cybercriminals actually impersonating Instagram representatives pretending to address copyright infringement issues. In these cases, a hacker sends a link to your email or through a private message on Instagram and asks you to log in in order to address the issue. This is a real-life example of a message that was used to hack @wandertears:
You can learn more about this case by checking out this article.
The link leads to a fake page that, even though it mimics Instagram’s login page, is actually designed to collect your username and password details. The only difference between the real page and the fake is a small variation in the URL, which is hard to detect.
To avoid raising suspicion, cybercriminals usually redirect you to one of Instagram’s legitimate FAQ pages that discusses the topic of copyright infringement.
The solution
There’s a couple different methods you can use to verify the messages you receive from Instagram. First, urgent Instagram notifications are usually delivered directly through the account interface or via email. If you receive a DM about your account, it won’t be legitimate - even if it’s from a profile that has the name “Instagram” in the username.
Second, Instagram now allows you to see a record of all security and login emails through your account. If you receive a suspicious email directly to your inbox, you should check this part of your Instagram account before opening the message.
From your profile, go to Security>Emails from Instagram. If you don’t see a record of the email, you should delete it right away.
{{subscribe}}
2. Deceitful verified badge offers
The tactic
You’re probably familiar with verified badges, the blue pins at the top of Instagram profiles that have been authenticated by the social network. While valuable, this account feature is also at the center of another social engineering that hackers use to break into Instagram.
In this scenario, hackers send a private message or email that offers a chance to add a verified badge, linking to a deceitful website that collects your login information. They may request that you don’t change your profile data, like username or password, until the change has taken effect in order to gain enough time to break into your account.
Here’s an example of a verification badge scam email sent to the owners of pillow business, Cuddle Buddy.
The solution
There are a few tell-tell discrepancies here to help you avoid falling for such a scam. For starters, grammar mistakes like excessive capitalization should serve as a warning. Not only this, but the profile the message is being sent from does not belong to an official account nor does it have a verified account. It has the word “Instagram” in the name, but it doesn’t give any indication of being official. Finally, note how the “contact us” text on the blue button is not centered properly, so it’s not consistent with other Instagram content.
To get a blue verification badge right now you need to apply through your profile, and the form you have to fill in should look a little something like this:
3. Illegitimate suspicious activity alerts
The tactic
Hackers that employ social engineering attacks leverage every piece of information they have at their disposal. For example, they sometimes design suspicious activity alerts that look like a legitimate notification from Instagram, but actually contain malicious links.
The solution
According to the Meta-owned social platform, emails from Instagram only come from “@mail.instagram. com” or “@facebookmail.com” addresses. Here’s an example of what a legitimate security email from Instagram looks like:
This security message is for a new login from a device that the user didn’t commonly sign in through. Note how the email address is from a trusted source and how all of the design elements are aligned properly.
Even if the emails you receive look legitimate, we advise that you go to your Instagram account and verify that the security email was sent through there.
4. Fraudulent giveaways and brand sponsorships
The tactic
Fraudulent giveaways are especially troublesome because they exist in an ecosystem that is packed with legitimate promotional freebies. This form of social engineering can take two different shapes.
In its most traditional version, this type of hack operates like a false verified badge attack. The difference is that the hacker impersonates a big brand, exciting start-up, or similar renowned company that’s offering a big giveaway to specific social media influencers.
Some scammers even have legitimate-looking accounts that have been active for a while and have thousands of followers. The first message usually includes at least one spoofed link leading to a false Instagram login that’s designed to extract the username and password submitted.
A more complex form of fraudulent giveaways and sponsorships can occur when hackers have collected information about you, but still need a few more details to successfully breach your account. Instead of sending you a link to a spoofed login page, hackers may ask you to fill in a survey that asks for personal information, like your date of birth, mother’s maiden name, and other answers to common security questions.
Below is a real example of the phishing email that led to @FlipFlopWanderers getting hacked. Read their full story here.
The solution
Never rush or feel pressured into clicking links. Take time to investigate if the email looks legitimate: for instance, check for spelling mistakes and hover over the hyperlink to see if the URL leads to a familiar or safe website. To be extra safe, you could even Google the company supposedly sending the email, and contact them to check if they really did send you an email.
5. Counterfeit social media tools
The tactic
Managing a social media profile can take a huge amount of time, especially if you have a large base of followers. There are many tools that can simplify the process, but you also have to evaluate each platform to make sure it comes from a legitimate developer.
Just as with malicious web extensions, hackers can create counterfeit tools that are supposed to improve functionality, but actually pose a security threat.
These tools usually look and feel legitimate, but bring you very little in terms of functionality and practical value. This type of scheme is not as common because it requires a significant amount of resources, but it’s still used by cybercriminals looking for bigger, more valuable targets.
When this type of attack is successful, target users integrate the counterfeit tool into their social media accounts. This fake tool can be used to set up man-in-the-middle attacks, intercept all data, and extract login details, among other data.
The solution
It’s normal to watch your budget, especially in the early stages of your Instagram account. But, working with lesser-known, low-cost tools increases the chances of being targeted by scammers. To avoid this, you should opt for established tools that come from renowned providers or platforms that have been recommended by trusted peers.
6. Reverse proxy attacks
The tactic
All of the social engineering hacking techniques we’ve covered so far require hackers to manually create fake apps and website pages in order to collect details from their targets. With reverse proxy attacks, hackers don’t need to create a spoof website or app - instead they can automate the theft of credentials.
A reverse proxy attack is a type of man-in-the-middle approach - hackers direct victims to a domain that sits in between the user and the legitimate website. The URL will be very similar to the legitimate page, and the overall appearance in the malicious domain mirrors the legitimate page.
When applied to the Instagram context, you could receive a convincing email from a hacker that directs you to Instagram’s login page. What you don’t realize is that you’ve been sent to do this via a proxy server - so when you enter your credentials and log into Instagram, your information - including 2FA - is being intercepted in real time.
The solution
Be extremely cautious when clicking on links from your email inbox - always verify an email claiming to be from Instagram by checking your Instagram account. From your profile, go to Security>Emails - if the email doesn’t appear there, it’s likely a scam.
What Do Hackers Do After Hacking Your Account?
Now that we’ve answered the question “how do hackers steal Instagram accounts?” let's go over the reasons why these criminals may want to target your profile.
Like other types of criminals, hackers and other malicious actors flock to the most popular platforms because these present the biggest financial opportunities. Today, you can generate a significant amount of revenue from a large base of followers and hackers are eager to benefit from this.
Some of the common things a hacker may do once your account is breached include:
- Demand a ransom
- Scam your friends, family members, and customers. Investment, Bitcoin, and Romance scams are some of the most common.
- Sell your account on the dark web
- Use your account to run a fraudulent operation
- Make various types of illegal requests, like requesting lewd photos
What To Do If Your Instagram Is Hacked
Getting hacked on Instagram is a nightmare, especially if you're a business owner relying on your account to market your services and drive sales. Keep reading for a summary of what you can do if you've just been hacked. For more information, watch the video explainer below.
- Reach out to your social media insurance provider, who'll help you recover your account ASAP while paying you for each day you're locked out.
- Check your email for a message from [email protected] and select “revert this change”. If this doesn't work, continue to step 3.
- Click “Forgot password” on the login screen and request a login link. If this doesn't work, continue to step 4.
- Send a video selfie to Instagram: This method has helped a lot of people retrieve their accounts. An important detail here is that if your account doesn’t contain photos of your face, this verification process won’t work.
- Create a Business Account on Facebook, go to "Help", and select "My ad account was hacked". From there, you have a better chance of reaching a human customer support representative. We show how to do this in the video.
Looking for the Best Way to Protect Your Account?
Hackers use a wide range of approaches and develop new techniques regularly to hack Instagram accounts and bypass Instagram’s default security measures. The number of social media scam victims in the US skyrocketed from 46,000 to 95,000 in 2021, and that number shows no signs of slowing down in the future.
Learning about the different techniques that hackers use and implementing security best practices as a counter are the first steps to keeping your Instagram account safe. Unfortunately, however, there is no way to guarantee your account against hacks - even users with multi factor authentication set up are falling victim. That's why we launched Notch - to finally give creators peace of mind.
{{learn-more}}
How To Hack Someone’s Instagram Account
Instagram has become one of the most popular social media apps. In 2021, there were about 1.21 billion Instagram accounts worldwide. Many users have shared their life through photos, stories, and videos, putting a lot of their details and information in this one app.
However, for your reasons, which might be valid, you may want to hack an Instagram account. It’s not impossible to hack an account on Instagram, as they can, and do, get hacked. If you’re trying to learn how to hack an Instagram account, read on to learn the various methods.
How to Hack Someone’s Instagram Account with mSpy Tool
mSpy is one of the best Instagram spying apps that lets parents know what their children are doing online.
With the mSpy app on your child’s smartphone or computer, you can monitor their text messages, see where they are, and know with whom they are talking. It can monitor their browsing history, WhatsApp, Snapchat, Facebook, Instagram, and more.
The best part about mSpy is that you will receive a notification if your kid removes the app from their phone. Getting the software and using it is not difficult. Here are the steps:
Step 1) Get a subscription to mSpy
Enter your email address and purchase a plan based on your requirement
Step 2) Download the App.
Select the type of mobile device you want to monitor. (Android or iOS devices). You need to make sure that you have physical access to the phone. Here, we have selected an Android device.
Note: Pay careful attention to the instructions since some of their premium features require rooting your Android device or jailbreaking an iPhone.
Step 3) Select your Android device manufacturer
You will get different Android device manufacturers like 1) Samsung, 2) Huawei, 3) Xiaomi, 4) Moto, 5) Google Pixel, 6) LG and 7) any other manufacturers.
Here, we have selected Samsung. Then Press “Proceed,”
Step 4) Download the app on your Mobile device.
Follow on-screen instructions and configure mSpy.
Step 5) Log in with your credentials and open mSpy dashboard after 1-2 hours to track your kid’s Instagram activity.
Step 6) Click on the Instagram message option
Now scroll down and click the Instagram message option.
Step 7) See the Instagram activities
You can see all the Instagram messages of that person.
Remember that if your child loses or breaks their phone, you can put mSpy on a new device without changing your subscription.
Try mSpy >>
14-Days Money-Back Guarantee
How to Hack Instagram ID: 4 Methods
Hackers can use several methods to gain access to your Instagram account. Here are some common things hackers can do to manipulate your Instagram account.
Method 1: Using the Phishing
Phishing is a method of hacking that involves sending emails that appear to be from a reputable company. People may get tricked into providing personal information such as social security numbers, passwords, and credit card numbers with these emails alone.
This method can also access a person’s social media accounts. The email or Instagram message may pretend to be from the Instagram company itself and tell the recipient they have been the victim of an attack. They will be instructed to provide their username and password to take the following steps. That information is all that a hacker needs to get into their account.
Method 2: Password with a Keylogger
Keylogging software is another way your Instagram account can be hacked. It is more difficult for hackers to do this from a distance since the software has to be installed on your computer. However, it is the kind of thing your employer could have access to.
This software can keep track of every keystroke from the target device. You could visit Instagram, put in your login credentials, and keep a record of every key you pressed on your keyboard and sent to another computer. With that information, someone could figure out which of those strokes were your username and password.
Method 3: Hack an Account by Guessing a Password
Hackers who use the method to get into your Instagram account could be guessing your password. It is the route parents might take with their children’s devices.
If you know the person, it could be easy to guess their password. It could be their pet’s name or the name of their favorite band. Moreover, many users use the same password for multiple accounts, making it even easier.
Method 4: By Opening Saved Passwords Storage
Accessing saved passwords on a computer is a tricky method of hacking that requires a lot of experience. It is a method used by actual hackers that do not want your information for good purposes.
Sometimes, it is used in conjunction with phishing. If they can get you to give them remote access to your computer by clicking a login link, they can go into your files and find the passwords to all the websites you visit frequently.
Once they find the password for Instagram, they can get your pictures, Instagram messages, friends list, and more.
What Happens if Someone Hacks Your Instagram Account?
The last thing you may want is to have someone else hack your own Instagram account. If a hacker can manage your account on this social media app, they’ll be able to have access to your personal information like:
- Phone number
- Email address
- Birthday
- Name
- Videos
- Photos
- Stories
- Activities
- People you follow
- Messages
- Likes
In most cases, hackers gather personal details to access your email, accounts in other social media apps, bank accounts, and many others.
What Are the Reasons to Hack Instagram Accounts Without Using a Password?
The term “hacking” immediately conjures images of computer thieves. For the most part, that word describes gaining access to someone’s computer to steal or do something secretly.
However, here are some valid reasons why people want to hack someone’s Instagram accounts:
For Parental Control: Parents of young children or teenagers must be careful in today’s online world. There are countless ways to be taken advantage of. They could be the target of online bullying by their peers or something even darker, such as physical or sexual abuse. Parents need to have a tool that will allow them to see what their children are doing online and to who they are sending direct messages.
Snooping through an Instagram account to manage your children’s activities would probably make them angry, but many parents find no other way to be sure they are keeping their kids safe.
For Revealing a Cheating Spouse: Few things can be more emotionally hurtful than finding out your spouse has been unfaithful. Some people have found various ways to hack their spouse’s Instagram account to obtain proof of their infidelity. It may seem like an ultimate step, but in some states, that proof is necessary during divorce proceedings.
For Employee Monitoring: There are not many ways that a company can justify hacking their employees’ Instagram accounts. They can argue that they want to be sure you are not using social media during your working hours. They may say they are monitoring to be sure your conduct is up to their company standards.
Most people believe accessing your private Instagram account is a trust violation and can see anything they need on your public posts. However, some companies will use software to access your social media accounts.
For Stealing Personal Information: The most common reason why hackers may illegally access an Instagram account is to get one’s personal information. If a hacker succeeds in logging into an account on Instagram, they can open accounts in an individual’s name and may be able to access the people they connect with online.
Not only that, but they may also be able to access personal information tied to the account, allowing them to gather and steal important personal information.
How To Prevent Instagram from Being Hacked
You know how your account could be vulnerable to a hacking attack, but there are many things you can do to protect yourself.
- Request a Login Link from Instagram: Getting a login link is a form of two-factor authentication. You can request that Instagram send you a new login link to your email. You can change your password when you open that email and click the link. Once that is done, anyone who has access to your account will be logged out and removed.
Because they won’t know your new password, it will force hackers to start over with the hacking process. However, most of them, at this point, would instead move on to a new account to hack. - Request a Security Code or Support from Instagram: In a similar way, you can request that Instagram email you a security code. Clicking on the link in your email will prompt you to enter the code. Once that is done, you will have the opportunity to change your password to log in.
- Verify Your Identity: You can also request that Instagram verifies your identity. You will enter your full name and submit your driver’s license or government-issued ID. Since a hacker will have none of these documents, they will get kicked offline and no longer have access to your account.
How to enter someone else's Instagram account
How to get into someone else's Instagram ? In today's article, you will learn how How to log into someone else's instagram account .
Can Instagram be hacked? This may be your question as well. Learning how to hack an Instagram password is good because if you know how hackers hack someone's Instagram, you can protect your account from future attacks.
Instagram is one of the largest social media platforms in the world, so the two most popular queries on Google are "hack Instagram" or "How to hack Instagram".
Regardless of the intentions of users searching for these terms, you need to increase your knowledge of the Instagram hack. In this article, you will learn about all the methods that hackers use to hack an Instagram account.
By the way, you can learn how to recover a hacked Instagram account in our guide How to recover a hacked Instagram account? and use it if you encounter a situation where your Instagram password has been leaked.
How to login to someone else's Instagram account How to login to someone else's Instagram account
Here are some popular applications that you can use to login. someone else's instagram account, follow our complete guide:
1. Minspy
This is an application that you download to a person's browser. By installing this app, you get access to a person's real-time location, social networking site, text messages, and phone call logs.
This is a very light and easy to use application.
No technical knowledge is required to use this application. However, to use this app, you need to have access to the user's phone.
You will need to access the Minspy website through a web browser.
Click on the subscription icon located on the right side of the page.
Enter your email address and password. Now you would create an account with Minspy.
The next thing you need to do is access the person's mobile phone. You will need to click on the "Settings" option and scroll down to the "Lock screen and security" option.
Then click "Unknown Sources" and enable this.
Now you need to download the application to the person's Android phone.
This will take a few minutes.
Open the app and enter the username and password you used to register your account.
After logging in, the application will disappear and the person will not know that it was originally installed.
To check a person's Instagram activity, you will now need to access the online control panel.
You can now view the person's messages, location, apps they use, and more.
How to log into someone else's Instagram account using IOS devices
You can even use Minspy to log into someone else's Instagram account that uses an IOS device.
As above, you will first need to enter your username and password on the Minspy login page.
You will then need to purchase a monthly subscription plan to remotely monitor a person's device.
The best feature of this tool is that when spying using an IOS device, you don't need an app on the person's device.
What you need is access to the person's iCloud account.
Enter your iCloud account information for the username. Wait a few minutes and Minspy will sync the target phone to your Minspy account.
Once the sync is complete, you will have access to that person's online activities.
2. Child Lock
This is another app that you can use as an alternative to login to someone's Instagram account.
This app is used by many parents who are worried about getting their kids' Instagram password.
The application has a key logging feature that captures keystrokes on the device. Including passwords.
There are other monitoring functions in this application.
Using Kidsguard, you can also track your child's WhatsApp messages, location, call logs, browsing history, sensitive information, Facebook account, Instagram login credentials and more.
This app has some great features and is available for download on iOS devices and Android phones.
How to use KidsGuard to log into someone's Instagram account:
- Create your account here
The first step you need to take is to create an account on the KidsGuard official website. Visit their website and enter a valid email address and password.
.
2. Set up an account
You will need to provide information about the target device
To do this, you need to download the APK file to your Android device. Visit clevguard.net and download the APK.
Once this is done, you can open the Kidsguard app again and use the credentials you used previously.
3. Sign in to your Instagram account.
After installing the APK, you can access its online dashboard and start using many of the features of KidsGuard.
To track your child's password, you can use the Keylogger feature.
You can now see your child's password whenever they enter it.
3)
CocoSpyThis application is only available for Android users.
This is a good application to protect your child from certain harms on the Internet.
For example, cyberbullying, adult content, and more. A family member can at least know what's going on in their child's digital life.
With this application, you can track your social media accounts and Instagram data.
How to use CocoSpy?
First you need to create a CocoSpy account.
Enter username and password.
Next, you will need to install the CocoSpy application on your child's device.
Then you need to make some changes to your child's phone settings. Follow the simple steps below:
- Open Settings
- Click Security
- Click Unknown Sources and enable it. Then press OK
Now you need to get ready to install Cocospy. Do the following:
- Click Settings.
- Click on Google
- Click on Security
- Click on Google Play Protect
- Disable "Improve malware detection" and "Scan device for security threats".
Now download the Cocospy app
Once this process is complete, you can go to the download page on your child's device.
The download page is on the wizard page.
Download the APK file from the notification popup or Download folder.
Click Install and open the application.
You are now ready to view your child's Instagram account through the dashboard.
You can do this from your computer or device.
Synchronization of all data during the first installation may take several minutes. The next time you open the app, it will be faster.
4. Instagram spy
“Catch all your favorite social networks and text messages with Best SMS Tracker app. See incoming or outgoing calls, read texts that were sent but deleted (also), follow Instagram posts or Snapchat stories without having to root your phone!
You don't need to jailbreak to use SMS Tracker.
This is also a great tool for parents who want to keep track of their kids' phones.
How do I log into someone's Instagram account without using the app?
The above methods involve downloading an application.
There are ways to do this without downloading the application.
There are websites that claim to be able to do this. For example, install
What is Installlac?
Basically, it is an Instagram hacking tool.
To use Installak, do the following:
- Open Installak on your computer
- Click Start Hacking at the top of the screen.
- Enter the username of the account you want to hack
- Click "verify account"
- Then click Upload login details.
Is the installer real or fake?
We do not recommend using sites like Installak. In this way, you can put your device at risk.
Many of the sites are not secure and their claims of 99% success tend to be false.
Asking you to download files to your computer may also put your device at risk.
Therefore, tools such as Installak should be avoided.
The best way to log into someone's Instagram account:
Although we've shown you different ways to log into someone's Instagram account, the best way is to talk to your kids about honesty and trust.
All of the above tools and applications can cause mistrust and damage the relationship between you and the person who has been hacked.
Build a positive relationship so you can get your child's Instagram password without hacking their device.
how to log into someone else's instagram account?
By Milena Anderson Reading 6 min. Views 7 Posted
Short answer
- However, there are several methods you can try, including using the account owner's email address and password or trying to guess their username and password.
- If you're having trouble signing in, you can also contact Instagram support for help.
How to hack an Instagram account! Is it possible? MUST SEE
Use someone's Instagram WITHOUT KNOWING login! (Updated version)
How to login to Instagram without password?
There is no one-size-fits-all answer to this question, as the best way to log into someone's Instagram account varies by situation. However, some methods you can try include password guessing, using a password cracker, or looking up the account owner's email address and asking to be added as a subscriber.
How can I access another Instagram account?
There are several ways to access another Instagram account. One way is to log out of your account and then log in to another account. Another way is to use a third party app to access another account.
How are Instagram accounts hacked?
There are several ways to hack Instagram accounts. The most common way is to use a password cracking tool to guess the user's password. Another way is to use a phishing attack to trick the user into revealing their login information. Malware can also be used to gain access to a user's account.
Can someone else log into your Instagram account?
Yes, someone else can log into your Instagram account if they have your login details. They will be able to view your profile and photos and post on your behalf. It is important to keep your login information secure and not share it with anyone you do not trust.
Can you see if someone has multiple Instagram accounts 2021?
Yes, in 2021 it is possible to find out if someone has multiple Instagram accounts. If you want to check if someone has multiple Instagram accounts, you can use a tool like Social Blade.
Why can't I access my second Instagram account?
There may be several reasons why you cannot access your second Instagram account. One possibility is that you have reached the limit on the number of accounts you can link to your phone number. Another reason may be that you forgot the password for the second account. If you're still having problems accessing your account, try contacting Instagram support for help..
How can I recover my Instagram account without a phone number or email?
There is no reliable way to recover an Instagram account without a phone number or email, as these are the two main ways Instagram verifies ownership of the account. However, there are a few things you can try.
One option is to contact Instagram directly and explain the situation. You can do this by submitting a request through the Help Center on the Instagram website. Be sure to include your username and any other information you think might be helpful.
Will my boyfriend recognize me if I go to his Instagram?
There is no way to know for sure, but it is likely that he will be able to tell if you are logged into his account. Instagram has a feature that notifies users when someone logs into their account on a new device, so your boyfriend can get a notification if you log in on a phone.
Will someone be notified if someone tries to log into their Instagram from another device?
Yes, Instagram will send you an email notification if someone tries to log into your account from another device. This is a security measure to help protect your account from unauthorized access.
How do hackers know your password?
Hackers can get your password in several ways. One way is to use a program that guesses passwords until it finds the right one. Another way is to get the password from a website or program you have used in the past. Hackers can also get your password by stealing your computer or mobile device.
Can someone hack my Instagram if I have two-factor authentication?
Yes, someone can hack your Instagram if you have two-factor authentication. Two-factor authentication is an additional layer of security that you can use to protect your account from unauthorized access. However, it is not 100% reliable and a skilled hacker can bypass it. Therefore, it is important to use strong passwords and keep your account information up to date.
How do you know if someone has visited your Instagram?
There is no single answer to this question. However, there are a few things you can do to try and determine if someone has logged into your Instagram account without your permission. One thing you can do is check your account's recent activity. If you notice any unfamiliar login locations or devices, this could be a sign that someone has logged into your account without your permission. Also, you can change your password and see if the problem persists..0007
How do I find linked Instagram accounts?
To find linked Instagram accounts, open the app and tap the profile icon in the lower left corner of the screen.