Widepsread Campaign Hacking Instagram Accounts

A widespread hacking campaign that appears to stem from Russia is affecting hundreds of Instagram users, leaving people locked out of their accounts.
 
The hack sees Instagram account names, profile pictures, passwords and email addresses associated with accounts changed by the attackers, with the new email addresses originating from a Russian email provider. Many of the affected accounts have had their profile pictures replaced with stills from popular films, including Pirates of the Caribbean and Despicable Me 3.
 
Instagram (IG) is one of the most popular social networking sites today with one billion monthly users. With the sheer number of accounts, it has become a playground for cybercriminals and Kaspersky Lab wrote a blog post to help users prevent it from getting hijacked.
 
This social networking platform has also become a venue to connect with people from around the globe. But like in real life, users need to be wary of who they are connecting with especially when their accounts are on public mode.
To help IG users protect their account and minimize the chance of it getting hijacked, Kaspersky Lab made a list of things to be wary of.
 
Hijack method no. 1: Fake verification
Almost everyone wants that “Verified Account” or blue check badge. According to Kaspersky’s post, no one can just get a badge. It’s Instagram who decides to award it. 
For those who badly wanted a badge, scammers will pose as Instagram help centers and entice users to provide them with personal details such as “username, password, email address, first name, last name, and date of birth,” which all go right on the attackers’ laps. 
 
The users are made to wait for 24 hours and asked not to change account settings while the criminals do their job of compromising the account.
 
Criminals found a way to bypass the two-factor authentication by displaying a message saying a support service will contact the owner for more details. The message will ask for an SMS code or other security information.
 
Hijack method no. 2: Plain old phishing
Don’t be fooled by “scary messages” that the account is hacked or log-in credentials need to be updated. Then there is this scam to “rate a photo” that will need the users to log in to the social network. When messages start asking for these credentials then this is the time to be more wary and suspicious.
Kaspersky Lab offers the following precautionary measures to guard your account against getting compromised.
• Prevention is better than cure — especially if curing is next to impossible. By observing these simple rules, you can stay safe:
• Don’t click on suspicious links.
• Always check the address bar for the URL of the web page. If instead of Instagram.com it says something like 1stogram.com or instagram.security-settings.com, get out of there quick, and don’t even think about entering any personal data on pages like this.
• Only use the official social network app from the official store — such as Google Play for Android, or App Store for iOS.
• Don’t use account login credentials for authentication on third-party services and apps.
With more than a billion users worldwide, Instagram has long been a target of choice for all kinds of scammers. Having hijacked an account, they get access to the user’s personal information and messages. 
 
Not only that, the account can be used to spread spam, phishing, and malicious content. Quite often, on taking possession of an account, the attackers change the handle, profile photo, and e-mail address and phone number to which it is linked. 
That makes it nearly impossible for the true owner to restore access to their Instagram account.
 
How to protect against Instagram hijacking 
As always, prevention is better than cure, especially if a cure is next to impossible. By observing these simple rules, you can stay safe:
• Don’t click on suspicious links.
• Always check the address bar for the URL of the Web page. If instead of Instagram.com it says something like 1stogram.com or instagram.security-settings.com, get out of there quick, and don’t even think about entering any personal data.
• Use the official social network app from the official store, such as Google Play for Android, or App Store for iOS.
• Don’t use account login credentials for authentication on third-party services and apps.
• Use a reliable security solution that sifts out suspicious messages and blocks phishing pages.
 
Independent:       BackEndNews      Kaspersky:     Image: CustomerPowerDesigns
 
You Might Also Read:
 
Facebook & Instagram Now Show How Long You Use Them:
 
Hamas Turns To Instagram To Lure IDF Soldiers:
« Germany Promotes Cybersecurity Research
British Airways Fake Facebook Page »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

Nethemba

Nethemba

Nethemba provide pentesting and security audits for networks and web applications. Other services include digital forensics, training and consultancy.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

RangeForce

RangeForce

RangeForce delivers the only integrated cybersecurity simulation and skills analysis platform that combines a virtual cyber range with hand-on training.

Stage2Data

Stage2Data

Stage2Data is one of Canada’s most trusted cloud solution providers offering hosted Backup and Disaster Recovery Services.

NetSecurity

NetSecurity

NetSecurity is a Brazilian company specializing in Information Security. We provide Managed Security Services (MSS), network security solutions and other specialist services.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.

Shield Capital

Shield Capital

Shield Capital helps founders build frontier solutions in cybersecurity, artificial intelligence, space & autonomy for commercial and government enterprises.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

AUCloud

AUCloud

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure.

Robosoft Technologies

Robosoft Technologies

Robosoft Technologies is a full-service digital transformation partner. We provide end-to-end digital transformation services in areas including cybersecurity.

SECTA5

SECTA5

SECTA5 is a cybersecurity company building a next-generation Continuous Threat and Exposure Management platform, leveraging the expertise of offensively trained cyber defenders.

When Group

When Group

World Health Energy Holdings, Inc. (d/b/a WHEN Group) is a High Tech Holding Company that specializes in the Cyber, Security and Telecom area.

CRYPTIQ

CRYPTIQ

CRYPTIQ empowers businesses to navigate the ever-evolving cybersecurity landscape with confidence and clarity.