Widepsread Campaign Hacking Instagram Accounts

A widespread hacking campaign that appears to stem from Russia is affecting hundreds of Instagram users, leaving people locked out of their accounts.
 
The hack sees Instagram account names, profile pictures, passwords and email addresses associated with accounts changed by the attackers, with the new email addresses originating from a Russian email provider. Many of the affected accounts have had their profile pictures replaced with stills from popular films, including Pirates of the Caribbean and Despicable Me 3.
 
Instagram (IG) is one of the most popular social networking sites today with one billion monthly users. With the sheer number of accounts, it has become a playground for cybercriminals and Kaspersky Lab wrote a blog post to help users prevent it from getting hijacked.
 
This social networking platform has also become a venue to connect with people from around the globe. But like in real life, users need to be wary of who they are connecting with especially when their accounts are on public mode.
To help IG users protect their account and minimize the chance of it getting hijacked, Kaspersky Lab made a list of things to be wary of.
 
Hijack method no. 1: Fake verification
Almost everyone wants that “Verified Account” or blue check badge. According to Kaspersky’s post, no one can just get a badge. It’s Instagram who decides to award it. 
For those who badly wanted a badge, scammers will pose as Instagram help centers and entice users to provide them with personal details such as “username, password, email address, first name, last name, and date of birth,” which all go right on the attackers’ laps. 
 
The users are made to wait for 24 hours and asked not to change account settings while the criminals do their job of compromising the account.
 
Criminals found a way to bypass the two-factor authentication by displaying a message saying a support service will contact the owner for more details. The message will ask for an SMS code or other security information.
 
Hijack method no. 2: Plain old phishing
Don’t be fooled by “scary messages” that the account is hacked or log-in credentials need to be updated. Then there is this scam to “rate a photo” that will need the users to log in to the social network. When messages start asking for these credentials then this is the time to be more wary and suspicious.
Kaspersky Lab offers the following precautionary measures to guard your account against getting compromised.
• Prevention is better than cure — especially if curing is next to impossible. By observing these simple rules, you can stay safe:
• Don’t click on suspicious links.
• Always check the address bar for the URL of the web page. If instead of Instagram.com it says something like 1stogram.com or instagram.security-settings.com, get out of there quick, and don’t even think about entering any personal data on pages like this.
• Only use the official social network app from the official store — such as Google Play for Android, or App Store for iOS.
• Don’t use account login credentials for authentication on third-party services and apps.
With more than a billion users worldwide, Instagram has long been a target of choice for all kinds of scammers. Having hijacked an account, they get access to the user’s personal information and messages. 
 
Not only that, the account can be used to spread spam, phishing, and malicious content. Quite often, on taking possession of an account, the attackers change the handle, profile photo, and e-mail address and phone number to which it is linked. 
That makes it nearly impossible for the true owner to restore access to their Instagram account.
 
How to protect against Instagram hijacking 
As always, prevention is better than cure, especially if a cure is next to impossible. By observing these simple rules, you can stay safe:
• Don’t click on suspicious links.
• Always check the address bar for the URL of the Web page. If instead of Instagram.com it says something like 1stogram.com or instagram.security-settings.com, get out of there quick, and don’t even think about entering any personal data.
• Use the official social network app from the official store, such as Google Play for Android, or App Store for iOS.
• Don’t use account login credentials for authentication on third-party services and apps.
• Use a reliable security solution that sifts out suspicious messages and blocks phishing pages.
 
Independent:       BackEndNews      Kaspersky:     Image: CustomerPowerDesigns
 
You Might Also Read:
 
Facebook & Instagram Now Show How Long You Use Them:
 
Hamas Turns To Instagram To Lure IDF Soldiers:
« Germany Promotes Cybersecurity Research
British Airways Fake Facebook Page »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

Abacode

Abacode

Abacode is a Managed Security Services Provider (MSSP). We help businesses consolidate all of their Regulatory Compliance & Cybersecurity needs, under one roof.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

US Digital Corps

US Digital Corps

The U.S. Digital Corps is a new two-year fellowship for early-career technologists where you will work every day to make a difference in critical impact areas including cybersecurity.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

Cyber Ranges

Cyber Ranges

Cyber Ranges is the next-generation cyber range for the development of cyber capabilities and the validation of cyber security skills and organizational cyber resilience.

SENTRIQS

SENTRIQS

SENTRIQS advanced encryption technology is engineered to defend against the most sophisticated cyber threats, keeping your operations efficient and secure.

Iron EagleX

Iron EagleX

Iron EagleX deliver engineering solutions in cloud computing, big data, cyber, and machine learning technologies to US Government customers.