123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Instagram Phishing Scam – Popularity Targeted

Profile Picture
By Author: Virus Removal Gudilines
Total Articles: 72
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Instagram, the second most preferred social media platform among millennial has now caught the eyes of threat actors.  A recent string of Instagram Phishing Scam have terrorized Instagram users wherein cyber-maniacs target popular influencers – with over 100,000 followers.

What is it about this app that makes it so wildly successful?
Instagram is a popular social networking service owned by FaceBook where people share photos, videos etc.  As social media sites have grown in numbers by leaps and bounds, the following features give this online global network an edge over other social media platforms:

The clever design choices,
Implementation of fine filters to edit the pictures,
Provision to tag people who hold an account on Instagram,
Provide location information,
People’s desire to connect to a growing revenue stream is met by Instagram better than any other social media platform.
The popularity of Instagram has made it a prominent target in the cyber-crime world. Moreover, eye catching accounts with thousands of followers fascinate threat actors the most. The consequences of stealing such an account can be hazardous.

Let us read to know how the Instagram Phishing scam takes place.

Phishing Email Scam
Hackers gain access to popular Instagram accounts through phishing email scam. Victims receive email from threat actors posing as potential business partnership and contain a proposal to work together. As per the instructions in the mail, users are required to click on the link that directs them to phoney Instagram Login page that seeks user credentials (username & password). Once the user “logs in”, the hackers have their credentials.

The stolen credentials are used to login to victim’s account, encrypt the account and demand a ransom in Bitcoin to regain access. Panicked victims who agree to pay the ransom not only lose their money but the access to their account as well.

Fake Badge Promise
Accounts belonging to celebrities, popular bloggers or large companies hold a Blue tick, a sacred badge or a status symbol to add prestige and distinguish them from fake accounts. Until now this badge was awarded by the social networking site alone on basis of account popularity and fan following.

Recent changes in Instagram’s policy allow users to use the badge if their account meets certain criteria. The users themselves are required to take the initiative by requesting verification from the app by navigating to Settings-> Request Verification.

Unawareness of this recent change in policy among users has been leveraged by cyber criminals to exploit them. They created sites that masqueraded as Instagram help center pages, a hoax page that pretended to help users obtain information on badges.

Innocent users who visited the page were requested to enter username, password, full name, address, e-mail and date of birth — all for the promise of a badge.

Unsuspecting users who provided all the above mentioned information fell in the trap of threat actors who used this information to extort them.

Sham Alert Messages
Your account has been hacked! Your login credentials need updation! These scary alert messages are used to deceive users to gain access to their Instagram Accounts. When users click on these alert texts, they are redirected to fake login pages, where their keyboard strokes are recorded and sent to threat actors.

Read Full News:- Click here

More About the Author

Virus Removal Guidelines is a web portal that is committed to offer you with the best guides and removal tools for all your malware and virus infection issues. It is our desire to create awareness towards the various threats that roam the World Wide Web. We want to ensure that we have a future where every user is guaranteed to have better portal security and an efficient browsing experience. http://www.virusremovalguidelines.com/

Total Views: 74Word Count: 509See All articles From Author

Add Comment

Computers Articles

1. How To Fix Canon Printer Stops Working Error?
Author: michaels jonson

2. How To Fix System Restore Error 0x0000020 In Windows 10
Author: Marco

3. How To Fix 0x00000039 Error
Author: Marco

4. Seek Help For Your Business With Dot Net Software Services India
Author: Samidha Harinna

5. How To Fix “the Data Is Invalid” Error
Author: Marco

6. Regression Test Automation – 4 Best Practices
Author: Oliver Moore

7. 4 Ways Pharma Crm Improves The Customer Satisfaction
Author: Rashmi Deshpande

8. Microsoft 365 Sharepoint
Author: Online24x7

9. How To Setup Onedrive Personal Vault On Windows 10?
Author: Marco

10. How To Fix 0x800f0923 Upgrade Error Code On Windows 10?
Author: Marco

11. How To Fix Java 1618 Error Code On Windows 10
Author: Marco

12. How To Customize Google Forms With Fonts, Images, And Themes
Author: Aida Martin

13. Fixed: Windows Mixed Reality Not Working Error
Author: Elina John

14. Which Mac Upgrade Is Best: Ram, Cpu Or Ssd- Myth Busted
Author: Elina John

15. How To Fix 0x80d02017 Microsoft Store Error Code?
Author: Microsoft Store

Login To Account
Login Email:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: