Nasty Phishing Scam Targets Instagram

Phishing scam emails have recently become a very popular hacking attack method.  

Instagram is cautioning users not to fall for a new phishing scam which is trying to collect log-ins and hack users accounts. It is spreading like wild-fire across the Instagram social network. The scam looks like a selection of pictures ranked by hotness.

The thing about Instagram is that trends are usually spreading like wildfire all across the platform. This is one of the reasons why so many people love using it on a regular basis, but the fact of the matter is that a lot of the users that tend to use Instagram like this need to know about a little thing called the Nasty List. 

The way that the Nasty List works is that you get a message with a link to what is ostensibly a Nasty List for Instagram, which is basically supposed to be a list of users that have done strange or off putting things. 

If you click on the link, you will be taken to a login page that looks like the login page for Instagram. You will be asked to log in before you can actually look at the various entries in the nasty list, and when you enter your details, such as username/email id and password, hackers are going to be able to steal this information.

Twitter users who have posted screenshots of the scam. First Instagram users will receive a message from someone they know saying that you are on ‘The Nasty List’ and then if you sign in you will be taken to what looks like an Instagram log-in page and soon someone will attempt to hack your account. 

If you click on the link in the message you’ll be taken to one of several Instagram profiles apparently registered for the purpose, with names like “the_nasty_list_848.” This is because of the fact that the login page that you are going to be taken to does not actually belong to Instagram, it is just a front put up by hackers that are going to make it so that you would end up trusting the page and putting in your account details. 

This is a very common phishing technique that a lot of hackers tend to use in order to make the most of the kind of information that they are trying to obtain from a particular platform. You should be wary of such tricks because of the fact that it can sometimes end up compromising your security on the Internet all in all.

Phishing is currently the most frequently used methods to hack people’s accounts and the amount of philshing emails has more than doubled in the last year or so. 

Inforsecurity:        DigitalvInfromation World:      FCW

You Might Also Read:

The Top 5 Malware Attack Types:


 

« The IoT Is A Big Headache For Software Developers
Social Media Crime Is A Threat To Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

Matta

Matta

Matta is a cyber security consulting company providing information security services and solutions including vulnerability assessments, penetration testing and emergency response.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

Altaro Software

Altaro Software

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package.

OXO Cybersecurity Lab

OXO Cybersecurity Lab

OXO Cybersecurity Lab is the first dedicated cybersecurity incubator in the Central & Eastern Europe region.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

Orro Group

Orro Group

Orro create 'future now' solutions that make it faster, simpler and safer for you to access, store and share information. Wherever, whenever and with whomever you want.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Helix Security Services

Helix Security Services

Helix Security provides IT & information security consultancy to government and businesses across New Zealand.