Widepsread Campaign Hacking Instagram Accounts

A widespread hacking campaign that appears to stem from Russia is affecting hundreds of Instagram users, leaving people locked out of their accounts.
 
The hack sees Instagram account names, profile pictures, passwords and email addresses associated with accounts changed by the attackers, with the new email addresses originating from a Russian email provider. Many of the affected accounts have had their profile pictures replaced with stills from popular films, including Pirates of the Caribbean and Despicable Me 3.
 
Instagram (IG) is one of the most popular social networking sites today with one billion monthly users. With the sheer number of accounts, it has become a playground for cybercriminals and Kaspersky Lab wrote a blog post to help users prevent it from getting hijacked.
 
This social networking platform has also become a venue to connect with people from around the globe. But like in real life, users need to be wary of who they are connecting with especially when their accounts are on public mode.
To help IG users protect their account and minimize the chance of it getting hijacked, Kaspersky Lab made a list of things to be wary of.
 
Hijack method no. 1: Fake verification
Almost everyone wants that “Verified Account” or blue check badge. According to Kaspersky’s post, no one can just get a badge. It’s Instagram who decides to award it. 
For those who badly wanted a badge, scammers will pose as Instagram help centers and entice users to provide them with personal details such as “username, password, email address, first name, last name, and date of birth,” which all go right on the attackers’ laps. 
 
The users are made to wait for 24 hours and asked not to change account settings while the criminals do their job of compromising the account.
 
Criminals found a way to bypass the two-factor authentication by displaying a message saying a support service will contact the owner for more details. The message will ask for an SMS code or other security information.
 
Hijack method no. 2: Plain old phishing
Don’t be fooled by “scary messages” that the account is hacked or log-in credentials need to be updated. Then there is this scam to “rate a photo” that will need the users to log in to the social network. When messages start asking for these credentials then this is the time to be more wary and suspicious.
Kaspersky Lab offers the following precautionary measures to guard your account against getting compromised.
• Prevention is better than cure — especially if curing is next to impossible. By observing these simple rules, you can stay safe:
• Don’t click on suspicious links.
• Always check the address bar for the URL of the web page. If instead of Instagram.com it says something like 1stogram.com or instagram.security-settings.com, get out of there quick, and don’t even think about entering any personal data on pages like this.
• Only use the official social network app from the official store — such as Google Play for Android, or App Store for iOS.
• Don’t use account login credentials for authentication on third-party services and apps.
With more than a billion users worldwide, Instagram has long been a target of choice for all kinds of scammers. Having hijacked an account, they get access to the user’s personal information and messages. 
 
Not only that, the account can be used to spread spam, phishing, and malicious content. Quite often, on taking possession of an account, the attackers change the handle, profile photo, and e-mail address and phone number to which it is linked. 
That makes it nearly impossible for the true owner to restore access to their Instagram account.
 
How to protect against Instagram hijacking 
As always, prevention is better than cure, especially if a cure is next to impossible. By observing these simple rules, you can stay safe:
• Don’t click on suspicious links.
• Always check the address bar for the URL of the Web page. If instead of Instagram.com it says something like 1stogram.com or instagram.security-settings.com, get out of there quick, and don’t even think about entering any personal data.
• Use the official social network app from the official store, such as Google Play for Android, or App Store for iOS.
• Don’t use account login credentials for authentication on third-party services and apps.
• Use a reliable security solution that sifts out suspicious messages and blocks phishing pages.
 
Independent:       BackEndNews      Kaspersky:     Image: CustomerPowerDesigns
 
You Might Also Read:
 
Facebook & Instagram Now Show How Long You Use Them:
 
Hamas Turns To Instagram To Lure IDF Soldiers:
« Germany Promotes Cybersecurity Research
British Airways Fake Facebook Page »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Brainwave GRC

Brainwave GRC

Brainwave GRC is a leading European software provider focused on Identity Analytics and intelligence to strengthen IT security and compliance.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

Cynamics

Cynamics

Cynamics is the only network monitoring solution built specifically for Smart City, Public Safety and Critical Infrastructure networks.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

Defscope

Defscope

Defscope is an Azerbaijani company entirely focused on cybersecurity offering training, security consulting, and other professional services.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

Cisco Networking Academy

Cisco Networking Academy

Cisco Networking Academy is the world's largest classroom, bringing technology education, 21st-century skills, and improved jobs prospects since 1997.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

TOTM Technologies

TOTM Technologies

TOTM Technologies provides end-to-end identity management and biometrics products, powering Digital identity and Digital onboarding solutions.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.