Nasty Phishing Scam Targets Instagram

Phishing scam emails have recently become a very popular hacking attack method.  

Instagram is cautioning users not to fall for a new phishing scam which is trying to collect log-ins and hack users accounts. It is spreading like wild-fire across the Instagram social network. The scam looks like a selection of pictures ranked by hotness.

The thing about Instagram is that trends are usually spreading like wildfire all across the platform. This is one of the reasons why so many people love using it on a regular basis, but the fact of the matter is that a lot of the users that tend to use Instagram like this need to know about a little thing called the Nasty List. 

The way that the Nasty List works is that you get a message with a link to what is ostensibly a Nasty List for Instagram, which is basically supposed to be a list of users that have done strange or off putting things. 

If you click on the link, you will be taken to a login page that looks like the login page for Instagram. You will be asked to log in before you can actually look at the various entries in the nasty list, and when you enter your details, such as username/email id and password, hackers are going to be able to steal this information.

Twitter users who have posted screenshots of the scam. First Instagram users will receive a message from someone they know saying that you are on ‘The Nasty List’ and then if you sign in you will be taken to what looks like an Instagram log-in page and soon someone will attempt to hack your account. 

If you click on the link in the message you’ll be taken to one of several Instagram profiles apparently registered for the purpose, with names like “the_nasty_list_848.” This is because of the fact that the login page that you are going to be taken to does not actually belong to Instagram, it is just a front put up by hackers that are going to make it so that you would end up trusting the page and putting in your account details. 

This is a very common phishing technique that a lot of hackers tend to use in order to make the most of the kind of information that they are trying to obtain from a particular platform. You should be wary of such tricks because of the fact that it can sometimes end up compromising your security on the Internet all in all.

Phishing is currently the most frequently used methods to hack people’s accounts and the amount of philshing emails has more than doubled in the last year or so. 

Inforsecurity:        DigitalvInfromation World:      FCW

You Might Also Read:

The Top 5 Malware Attack Types:


 

« The IoT Is A Big Headache For Software Developers
Social Media Crime Is A Threat To Business »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

FDM Group

FDM Group

FDM Group is an international Professional services company with a focus on IT. Services offered include Software Testing, and Information Security with a focus on operational security and compliance.

Arsenal Insurance Company

Arsenal Insurance Company

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

Intrepid Solutions & Services

Intrepid Solutions & Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

Cyber Crucible

Cyber Crucible

Cyber Crucible is a cybersecurity Software as a Service company definitively removing the risk of data extortion from customer environments.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

LogicMonitor

LogicMonitor

LogicMonitor provides SaaS-based IT infrastructure monitoring services for on-premises and multi-cloud environments.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

OneZero Solutions

OneZero Solutions

OneZero specialize in cybersecurity operations, information assurance, computer network operations, solutions engineering, and project management.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.