Nasty Phishing Scam Targets Instagram

Phishing scam emails have recently become a very popular hacking attack method.  

Instagram is cautioning users not to fall for a new phishing scam which is trying to collect log-ins and hack users accounts. It is spreading like wild-fire across the Instagram social network. The scam looks like a selection of pictures ranked by hotness.

The thing about Instagram is that trends are usually spreading like wildfire all across the platform. This is one of the reasons why so many people love using it on a regular basis, but the fact of the matter is that a lot of the users that tend to use Instagram like this need to know about a little thing called the Nasty List. 

The way that the Nasty List works is that you get a message with a link to what is ostensibly a Nasty List for Instagram, which is basically supposed to be a list of users that have done strange or off putting things. 

If you click on the link, you will be taken to a login page that looks like the login page for Instagram. You will be asked to log in before you can actually look at the various entries in the nasty list, and when you enter your details, such as username/email id and password, hackers are going to be able to steal this information.

Twitter users who have posted screenshots of the scam. First Instagram users will receive a message from someone they know saying that you are on ‘The Nasty List’ and then if you sign in you will be taken to what looks like an Instagram log-in page and soon someone will attempt to hack your account. 

If you click on the link in the message you’ll be taken to one of several Instagram profiles apparently registered for the purpose, with names like “the_nasty_list_848.” This is because of the fact that the login page that you are going to be taken to does not actually belong to Instagram, it is just a front put up by hackers that are going to make it so that you would end up trusting the page and putting in your account details. 

This is a very common phishing technique that a lot of hackers tend to use in order to make the most of the kind of information that they are trying to obtain from a particular platform. You should be wary of such tricks because of the fact that it can sometimes end up compromising your security on the Internet all in all.

Phishing is currently the most frequently used methods to hack people’s accounts and the amount of philshing emails has more than doubled in the last year or so. 

Inforsecurity:        DigitalvInfromation World:      FCW

You Might Also Read:

The Top 5 Malware Attack Types:


 

« The IoT Is A Big Headache For Software Developers
Social Media Crime Is A Threat To Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

VivoSecurity

VivoSecurity

VivoSecurity is a pioneer in cyber risk quantification based on data science. Our products and services help organizations achieve optimal information security and GRC programs.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

CYBAVO

CYBAVO

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Firmus

Firmus

As the leading penetration testing services provider in Malaysia, Firmus evaluates the ability of your internal or external information assets to withstand attacks.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).