ALL >> Computers >> View Article
Instagram Phishing Scam – Popularity Targeted
Instagram, the second most preferred social media platform among millennial has now caught the eyes of threat actors. A recent string of Instagram Phishing Scam have terrorized Instagram users wherein cyber-maniacs target popular influencers – with over 100,000 followers.
What is it about this app that makes it so wildly successful?
Instagram is a popular social networking service owned by FaceBook where people share photos, videos etc. As social media sites have grown in numbers by leaps and bounds, the following features give this online global network an edge over other social media platforms:
The clever design choices,
Implementation of fine filters to edit the pictures,
Provision to tag people who hold an account on Instagram,
Provide location information,
People’s desire to connect to a growing revenue stream is met by Instagram better than any other social media platform.
The popularity of Instagram has made it a prominent target in the cyber-crime world. Moreover, eye catching accounts with thousands of followers fascinate threat actors the most. The consequences of stealing such an account can be hazardous.
Let us read to know how the Instagram Phishing scam takes place.
Phishing Email Scam
Hackers gain access to popular Instagram accounts through phishing email scam. Victims receive email from threat actors posing as potential business partnership and contain a proposal to work together. As per the instructions in the mail, users are required to click on the link that directs them to phoney Instagram Login page that seeks user credentials (username & password). Once the user “logs in”, the hackers have their credentials.
The stolen credentials are used to login to victim’s account, encrypt the account and demand a ransom in Bitcoin to regain access. Panicked victims who agree to pay the ransom not only lose their money but the access to their account as well.
Fake Badge Promise
Accounts belonging to celebrities, popular bloggers or large companies hold a Blue tick, a sacred badge or a status symbol to add prestige and distinguish them from fake accounts. Until now this badge was awarded by the social networking site alone on basis of account popularity and fan following.
Recent changes in Instagram’s policy allow users to use the badge if their account meets certain criteria. The users themselves are required to take the initiative by requesting verification from the app by navigating to Settings-> Request Verification.
Unawareness of this recent change in policy among users has been leveraged by cyber criminals to exploit them. They created sites that masqueraded as Instagram help center pages, a hoax page that pretended to help users obtain information on badges.
Innocent users who visited the page were requested to enter username, password, full name, address, e-mail and date of birth — all for the promise of a badge.
Unsuspecting users who provided all the above mentioned information fell in the trap of threat actors who used this information to extort them.
Sham Alert Messages
Your account has been hacked! Your login credentials need updation! These scary alert messages are used to deceive users to gain access to their Instagram Accounts. When users click on these alert texts, they are redirected to fake login pages, where their keyboard strokes are recorded and sent to threat actors.
Read Full News:- Click here
Virus Removal Guidelines is a web portal that is committed to offer you with the best guides and removal tools for all your malware and virus infection issues. It is our desire to create awareness towards the various threats that roam the World Wide Web. We want to ensure that we have a future where every user is guaranteed to have better portal security and an efficient browsing experience. http://www.virusremovalguidelines.com/
Computers Articles1. Best Election Management Software Solution In 2020
Author: prateek mishra
2. Fortnite: How To Unlock Different Styles For Remedy Vs. Toxin Skin
3. 12 Best Apps To Install On Your New Iphone
4. Where To Find Missable Items In Final Fantasy 7
Author: Jaxson Harry
5. The Best Secure Cloud Storage For Your Personal And Business Needs
6. All You Need To Know About Glbrain Initial Exchange Offering
7. Buy A Laptop Computer Online Store
Author: Shweta Computer
8. Streamline Your Business Operation With Sales Force Automation Software
Author: Rati Bhanot
9. Laptop On Rent
Author: True Tech
10. M V Technologies - One Of The Top Web And App Development Companies In Noida
11. Building Your Own Desktop At Home? Keep An Eye For These Key Components.
Author: Sonu Kumar
12. Contact And Get Browser Support Over The Phone.
Author: kirlin jackeline
13. How Testing Transformation Leads The Way To Digital Transformation
Author: Oliver Moore
14. Use The Antivirus Program In An Efficient Way
Author: murphy felicia
15. How To Personalize Visual Feedback For Touch Points On Windows 10?
Author: Aida Martin