Instagram, TikTok & Twitter Shutdown Stolen Accounts

Instagram has shut down hundreds of accounts that were stolen during an online hacking operation that aimed at selling usernames. The Facebook-owned photo-sharing app has been taking down accounts stolen by the OGUsers cyber crime community group, a virtual market which is known to be a place to sell and exchange stolen usernames between hackers.

TikTok and Twitter have also taken action on accounts that have been harvested by the same group, according to cyber security expert Brian Krebs. He has reported that it’s a "coordinated" approach by the companies to take down these highly sought-after usernames, some of which have been involved in "lucrative" resales.

Facebook said it targeted a number of accounts tied to key sellers on OGUsers as well as those who advertise the ability to broker stolen account sales. OGUsers has helped to facilitate the hacking of accounts through methods such as SIM (Subscriber Identity Module) swapping, where a hacker gains control of someone's phone number and uses it to reset passwords and take control of their social media accounts. 

Although the big social media companies have began to taken action, SIM swapping is still considered a relatively simple hacking process.

The OGUsers forum earned notoriety last summer when it got into many famous people’s Twitter accounts and used them to spread a Bitcoin scam. Approximately 130 accounts were targeted, including ones belonging to Elon Musk and former US president Barak Obama. “Particularly prized by this community are short usernames, which can often be resold for thousands of dollars to those looking to claim a choice vanity name,” Brian Krebs commented.

Facebook said it targeted a number of accounts tied to key sellers on OGUsers, as well as those who advertise the ability to broker stolen account sales. "Today, we're removing hundreds of accounts connected to members of the OGUsers forum...  we will continue to do all we can to make it difficult for them to profit from Instagram usernames," a Facebook spokesperson said. 

Like most cyber crime forums, OGUsers is populated by criminals, some of whom act as intermediaries in the sale of private data.  

Krebs On Security:          ITPro:         The Verge:          ITPro

You Might Also Read:

Diving Into The Dark Web:

« Cyber Security In Higher Education
Hiring Good Cyber Security Professionals Is Hard Work »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

National Cybersecurity Institute (NCI) - Excelsior College

National Cybersecurity Institute (NCI) - Excelsior College

NCI is Excelsior College’s research center dedicated to assisting government, industry, military and academic sectors meet the challenges in cybersecurity policy, technology and education.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

Asvin

Asvin

Asvin provides secure update management and delivery for Internet of Things - IoT Edge devices.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

FDD Center on Cyber and Technology Innovation (CCTI)

FDD Center on Cyber and Technology Innovation (CCTI)

The Foundation for Defense of Democracies is a nonprofit research institute focusing on foreign policy and national security. Ares of focus include cyber security and technology innovation.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

CITRA - Information Security and Emergency Response

CITRA - Information Security and Emergency Response

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

Beacon Technology

Beacon Technology

Beacon Technology offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools.