Instagram is not just the second most popular social network in the world, but also a means of income for numerous photobloggers, models, and other Internet celebrities. Eye-catching accounts with many thousands of followers are of interest not only to fans, but also to cybercriminals. If such an account is stolen, the consequences can be nasty. But how exactly do Instagram accounts get hijacked, and how can you avoid yours getting snared?

 

Hijack method no. 1: fake verification
You’ve probably noticed a blue tick next to some Instagram accounts, a Verified Badge. These status symbols are worn by accounts belonging to celebrities, large companies, and popular bloggers. The sacred badge is especially important for accounts with large audiences because it adds prestige, and distinguishes these accounts from the fake ones. Getting hold of a badge isn’t that easy: there’s no application form or “badge store”— the social network decides for itself who to award them to.

 

How to get verified on Instagram? You can’t. On Twitter, there was a time when it was possible to get verified user status by filling out a form and providing data to prove who you are. But there’s nothing like this on Instagram.

 

However, many users are unaware that account owners have no influence over the appearance of the cherished blue tick. And this is a fact that’s being exploited by scammers. Cybercriminals are creating sites that masquerade as Instagram help center pages, and these request details from Instagram users such as their username, password, email address, first name, last name, and date of birth — all for the promise of a badge.

 

Having entered this data, the unsuspecting user is told to wait 24 hours for a decision, and not to change their account settings during this period. The information goes straight to the attackers, while the user just sits and waits, unaware that their account is now compromised.

 

This method can also be used to get personal information belonging to the victim, which can help the cybercriminals bypass two-factor authentication processes. To do this, criminals display a message saying that the support service may contact the account owner to clarify their details.

 

When the “support service” does make contact, it’s the scammers themselves asking for an SMS code or other security information. Scammers might also send a fake support service message requesting information supposedly needed for verification, which they can use when dealing with the real support service behind the account owner’s back (the data requested might include, for example, a photo or other data that the genuine service might ask for).

 

Hijack method no. 2: plain old phishing
Scammers are also continuing to use common phishing techniques to lure the victim to a fake login or password reset page. For example, they might send a scary message saying that the user’s account has been hacked or that their login credentials need updating, or simply offer to “rate a photo” which supposedly requires the user to login to the social network.

 

With more than a billion users worldwide, Instagram has long been a target of choice for all kinds of scammers. Having hijacked an account, they get access to the user’s personal information and messages. Not only that, the account can be used to spread spam, phishing, and malicious content.

 

Quite often, on taking possession of an account, the attackers change the handle, profile photo, and email address and phone number to which it is linked. That makes it nearly impossible for the true owner to restore access to their Instagram account.

 

How to protect against Instagram hijacking

 

As always, prevention is better than cure — especially if curing is next to impossible. By observing these simple rules, you can stay safe:

  • Don’t click on suspicious links.
  • Always check the address bar for the URL of the web page. If instead of Instagram.com it says something like 1stogram.com or instagram.security-settings.com, get out of there quick, and don’t even think about entering any personal data on pages like this.
  • Only use the official social network app from the official store — such as Google Play for Android, or App Store for iOS.
  • Don’t use account login credentials for authentication on third-party services and apps.
  • Use a reliable security solution that sifts out suspicious messages and blocks phishing pages. Kaspersky Internet Security can handle that task for you.

 


RECOMMENDED ARTICLE FOR TECHWORLD


 
5 Entertaining Vlogs to Help Get You through Everyday Traffic
Techworld Date Posted: 31 May 2018 2:52 PM | 109 Views
We have come to accept traffic as part of city life, and we all have our ways of coping like sneaking in a quick nap, tuning into our own ‘traffic playlist,’ catching up on.... See More
 
5 Entertaining Vlogs to Help Get You through Everyday Traffic
Techworld Date Posted: 2:52 PM | 109 Views
We have come to accept traffic as part of city life, and we all have our ways of coping like sneaking in a quick nap, tuning into our own ‘traffic playlist,’ catching up on...See More

 
Transcend Offers Lightning-enable Storage Solution, the Perfect Match for iOS Devices
Techworld Date Posted: 23 August 2017 1:44 PM | 182 Views
Transcend Information, Inc. (Transcend), a leading manufacturer of storage and multimedia products, is proud to introduce its bidirectional transmission and storage solution for iOS device users. Transcend's Lightning offerings, crafted for use with iOS.... See More
 
Transcend Offers Lightning-enable Storage Solution, the Perfect Match for iOS Devices
Techworld Date Posted: 1:44 PM | 182 Views
Transcend Information, Inc. (Transcend), a leading manufacturer of storage and multimedia products, is proud to introduce its bidirectional transmission and storage solution for iOS device users. Transcend's Lightning offerings, crafted for use with iOS...See More

 
Fighting Ransomware: Kaspersky Lab Saved $53M for its Clients in 2015
Techworld Date Posted: 9 June 2016 10:59 AM | 136 Views
Kaspersky Lab has announced that in 2015, its solutions protected 443,920 users and corporate customers worldwide from crypto-ransomware, depriving cybercriminals of nearly $ 53 million in illegal earnings. Crypto-ransomware, and the cybercriminals that use it,.... See More
 
Fighting Ransomware: Kaspersky Lab Saved $53M for its Clients in 2015
Techworld Date Posted: 10:59 AM | 136 Views
Kaspersky Lab has announced that in 2015, its solutions protected 443,920 users and corporate customers worldwide from crypto-ransomware, depriving cybercriminals of nearly $ 53 million in illegal earnings. Crypto-ransomware, and the cybercriminals that use it,...See More

 
As Data Volumes Explode, Toshiba and Helium Help the Cloud Float to New Capacity Highs
Techworld Date Posted: 26 April 2018 5:31 PM | 337 Views
Storing digisnaps of places visited and meals eaten, archiving documents, sharing conference materials with colleagues; these days it’s becoming second nature to store all sorts of data in the cloud, where it’s safe until.... See More
 
As Data Volumes Explode, Toshiba and Helium Help the Cloud Float to New Capacity Highs
Techworld Date Posted: 5:31 PM | 337 Views
Storing digisnaps of places visited and meals eaten, archiving documents, sharing conference materials with colleagues; these days it’s becoming second nature to store all sorts of data in the cloud, where it’s safe until...See More

 
Next Generation of Kaspersky Private Security Network: Extensive Threat Intelligence within the Network Walls
Techworld Date Posted: 12 September 2017 1:24 PM | 214 Views
Kaspersky Lab is introducing its next generation of Kaspersky Private Security Network, a private version of Kaspersky Security Network that allows enterprises to boost their detection speed with access to real-time global threat intelligence.... See More
 
Next Generation of Kaspersky Private Security Network: Extensive Threat Intelligence within the Network Walls
Techworld Date Posted: 1:24 PM | 214 Views
Kaspersky Lab is introducing its next generation of Kaspersky Private Security Network, a private version of Kaspersky Security Network that allows enterprises to boost their detection speed with access to real-time global threat intelligence...See More

 
F5 Named a WAF Leader by Independent Research Firm
Techworld Date Posted: 5 September 2018 3:35 PM | 22 Views
F5 Networks (NASDAQ: FFIV) just announced that it has been named a Leader in the Forrester Wave™: Web Application Firewalls, Q2 2018 report, published June 25, 2018. . See More
 
F5 Named a WAF Leader by Independent Research Firm
Techworld Date Posted: 3:35 PM | 22 Views
F5 Networks (NASDAQ: FFIV) just announced that it has been named a Leader in the Forrester Wave™: Web Application Firewalls, Q2 2018 report, published June 25, 2018. See More

 
ViewSonic to Showcase XG Series of Gaming Monitors at ESGS 2017
Techworld Date Posted: 25 October 2017 2:32 PM | 194 Views
ViewSonic Corp., a leading global provider of visual solution products, today announced it will be exhibiting its latest gaming monitors at the Electronic Sports and Gaming Summit (ESGS) 2017,. See More
 
ViewSonic to Showcase XG Series of Gaming Monitors at ESGS 2017
Techworld Date Posted: 2:32 PM | 194 Views
ViewSonic Corp., a leading global provider of visual solution products, today announced it will be exhibiting its latest gaming monitors at the Electronic Sports and Gaming Summit (ESGS) 2017,See More

 
STAR WARS FANS: CHOOSE YOUR SIDE!
Techworld Date Posted: 9 November 2017 1:11 PM | 198 Views
PHILIPPINES — November 8, 2017: Lenovo (HKSE: 992) (ADR: LNVGY), the world’s leading PC manufacturer, today announced that its highly anticipated,. See More
 
STAR WARS FANS: CHOOSE YOUR SIDE!
Techworld Date Posted: 1:11 PM | 198 Views
PHILIPPINES — November 8, 2017: Lenovo (HKSE: 992) (ADR: LNVGY), the world’s leading PC manufacturer, today announced that its highly anticipated,See More

 
Phantom Menace: Mobile Banking Trojan Modifications Reach All-Time High
Techworld Date Posted: 23 August 2018 2:10 PM | 203 Views
Mobile banking Trojans hit the list of cyber-headaches in Q2 2018. The number of installation packages for mobile banking – modifications which help attackers avoid detection by security solutions and to expand their arsenal.... See More
 
Phantom Menace: Mobile Banking Trojan Modifications Reach All-Time High
Techworld Date Posted: 2:10 PM | 203 Views
Mobile banking Trojans hit the list of cyber-headaches in Q2 2018. The number of installation packages for mobile banking – modifications which help attackers avoid detection by security solutions and to expand their arsenal...See More

 
Get a Free Star Wars™: Jedi Challenges with Select Lenovo Legion Laptops
Techworld Date Posted: 14 September 2018 3:45 PM | 71 Views
Lenovo, a global leader in PCs and smart devices, is currently having a promo that is sure to please gamers and Star Wars fans alike. Until supplies last, every purchase of selected Legion gaming.... See More
 
Get a Free Star Wars™: Jedi Challenges with Select Lenovo Legion Laptops
Techworld Date Posted: 3:45 PM | 71 Views
Lenovo, a global leader in PCs and smart devices, is currently having a promo that is sure to please gamers and Star Wars fans alike. Until supplies last, every purchase of selected Legion gaming...See More


Power by

Download Free AZ | Free Wordpress Themes