Nasty Phishing Scam Targets Instagram

Phishing scam emails have recently become a very popular hacking attack method.  

Instagram is cautioning users not to fall for a new phishing scam which is trying to collect log-ins and hack users accounts. It is spreading like wild-fire across the Instagram social network. The scam looks like a selection of pictures ranked by hotness.

The thing about Instagram is that trends are usually spreading like wildfire all across the platform. This is one of the reasons why so many people love using it on a regular basis, but the fact of the matter is that a lot of the users that tend to use Instagram like this need to know about a little thing called the Nasty List. 

The way that the Nasty List works is that you get a message with a link to what is ostensibly a Nasty List for Instagram, which is basically supposed to be a list of users that have done strange or off putting things. 

If you click on the link, you will be taken to a login page that looks like the login page for Instagram. You will be asked to log in before you can actually look at the various entries in the nasty list, and when you enter your details, such as username/email id and password, hackers are going to be able to steal this information.

Twitter users who have posted screenshots of the scam. First Instagram users will receive a message from someone they know saying that you are on ‘The Nasty List’ and then if you sign in you will be taken to what looks like an Instagram log-in page and soon someone will attempt to hack your account. 

If you click on the link in the message you’ll be taken to one of several Instagram profiles apparently registered for the purpose, with names like “the_nasty_list_848.” This is because of the fact that the login page that you are going to be taken to does not actually belong to Instagram, it is just a front put up by hackers that are going to make it so that you would end up trusting the page and putting in your account details. 

This is a very common phishing technique that a lot of hackers tend to use in order to make the most of the kind of information that they are trying to obtain from a particular platform. You should be wary of such tricks because of the fact that it can sometimes end up compromising your security on the Internet all in all.

Phishing is currently the most frequently used methods to hack people’s accounts and the amount of philshing emails has more than doubled in the last year or so. 

Inforsecurity:        DigitalvInfromation World:      FCW

You Might Also Read:

The Top 5 Malware Attack Types:


 

« The IoT Is A Big Headache For Software Developers
Social Media Crime Is A Threat To Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

IGX Global

IGX Global

IGX Global is a provider of information network and security integration services and products.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

Cybertron

Cybertron

Cybertron services include real-time monitoring and incident response and a cyber range for competency development.

Exeon Analytics

Exeon Analytics

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks.

SaltStack

SaltStack

SaltStack develops award-winning intelligent IT automation software. We help businesses more efficiently secure and manage all aspects of their digital infrastructure.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Novacoast

Novacoast

Novacoast helps organizations find, create & implement solutions for a powerful security posture through advisory, engineering, development & managed services.

Centroid

Centroid

Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.