Instagram is not just the second most popular social network in the world, but also a means of income for numerous photobloggers, models, and other Internet celebrities. Eye-catching accounts with many thousands of followers are of interest not only to fans, but also to cybercriminals. If such an account is stolen, the consequences can be nasty. But how exactly do Instagram accounts get hijacked, and how can you avoid yours getting snared?

 

Hijack method no. 1: fake verification
You’ve probably noticed a blue tick next to some Instagram accounts, a Verified Badge. These status symbols are worn by accounts belonging to celebrities, large companies, and popular bloggers. The sacred badge is especially important for accounts with large audiences because it adds prestige, and distinguishes these accounts from the fake ones. Getting hold of a badge isn’t that easy: there’s no application form or “badge store”— the social network decides for itself who to award them to.

 

How to get verified on Instagram? You can’t. On Twitter, there was a time when it was possible to get verified user status by filling out a form and providing data to prove who you are. But there’s nothing like this on Instagram.

 

However, many users are unaware that account owners have no influence over the appearance of the cherished blue tick. And this is a fact that’s being exploited by scammers. Cybercriminals are creating sites that masquerade as Instagram help center pages, and these request details from Instagram users such as their username, password, email address, first name, last name, and date of birth — all for the promise of a badge.

 

Having entered this data, the unsuspecting user is told to wait 24 hours for a decision, and not to change their account settings during this period. The information goes straight to the attackers, while the user just sits and waits, unaware that their account is now compromised.

 

This method can also be used to get personal information belonging to the victim, which can help the cybercriminals bypass two-factor authentication processes. To do this, criminals display a message saying that the support service may contact the account owner to clarify their details.

 

When the “support service” does make contact, it’s the scammers themselves asking for an SMS code or other security information. Scammers might also send a fake support service message requesting information supposedly needed for verification, which they can use when dealing with the real support service behind the account owner’s back (the data requested might include, for example, a photo or other data that the genuine service might ask for).

 

Hijack method no. 2: plain old phishing
Scammers are also continuing to use common phishing techniques to lure the victim to a fake login or password reset page. For example, they might send a scary message saying that the user’s account has been hacked or that their login credentials need updating, or simply offer to “rate a photo” which supposedly requires the user to login to the social network.

 

With more than a billion users worldwide, Instagram has long been a target of choice for all kinds of scammers. Having hijacked an account, they get access to the user’s personal information and messages. Not only that, the account can be used to spread spam, phishing, and malicious content.

 

Quite often, on taking possession of an account, the attackers change the handle, profile photo, and email address and phone number to which it is linked. That makes it nearly impossible for the true owner to restore access to their Instagram account.

 

How to protect against Instagram hijacking

 

As always, prevention is better than cure — especially if curing is next to impossible. By observing these simple rules, you can stay safe:

  • Don’t click on suspicious links.
  • Always check the address bar for the URL of the web page. If instead of Instagram.com it says something like 1stogram.com or instagram.security-settings.com, get out of there quick, and don’t even think about entering any personal data on pages like this.
  • Only use the official social network app from the official store — such as Google Play for Android, or App Store for iOS.
  • Don’t use account login credentials for authentication on third-party services and apps.
  • Use a reliable security solution that sifts out suspicious messages and blocks phishing pages. Kaspersky Internet Security can handle that task for you.

 


RECOMMENDED ARTICLE FOR TECHWORLD


 
BenQ’s ZOWIE XL2411P Is the Chosen Monitor of PGI
Techworld Date Posted: 25 July 2018 4:12 PM | 223 Views
The XL2411P has been chosen as the tournament monitor of PGI. ZOWIE strives to provide e-Sports professionals and enthusiasts with the best equipment to suit their personal preference, allowing them to focus on nothing.... See More
 
BenQ’s ZOWIE XL2411P Is the Chosen Monitor of PGI
Techworld Date Posted: 4:12 PM | 223 Views
The XL2411P has been chosen as the tournament monitor of PGI. ZOWIE strives to provide e-Sports professionals and enthusiasts with the best equipment to suit their personal preference, allowing them to focus on nothing...See More

 
NVIDIA Has Five Never-Before Seen Screenshots of the Upcoming PUBG Desert Map
Techworld Date Posted: 17 November 2017 11:37 AM | 175 Views
Today NVIDIA revealed five exclusive screenshots for the upcoming desert map for the wildly popular PlayerUnknown’s Battlegrounds (PUBG).. See More
 
NVIDIA Has Five Never-Before Seen Screenshots of the Upcoming PUBG Desert Map
Techworld Date Posted: 11:37 AM | 175 Views
Today NVIDIA revealed five exclusive screenshots for the upcoming desert map for the wildly popular PlayerUnknown’s Battlegrounds (PUBG).See More

 
Hitachi Vantara to Extend Reach in Philippines with Strategic MSI–ECS Partnership
Techworld Date Posted: 6 July 2018 3:42 PM | 354 Views
Manila, Philippines — Hitachi Vantara, a wholly owned subsidiary of Hitachi Ltd. (TSE: 6501), today announced an expansion of its distribution agreement with MSI – ECS Philippines, Inc. beyond Singapore and China.... See More
 
Hitachi Vantara to Extend Reach in Philippines with Strategic MSI–ECS Partnership
Techworld Date Posted: 3:42 PM | 354 Views
Manila, Philippines — Hitachi Vantara, a wholly owned subsidiary of Hitachi Ltd. (TSE: 6501), today announced an expansion of its distribution agreement with MSI – ECS Philippines, Inc. beyond Singapore and China...See More

 
Shaping the Leaders of Tomorrow
Techworld Date Posted: 9 August 2017 2:55 PM | 193 Views
From left: Harriet B. Fernandez, Director, Computing and Information Services Office, Lennie K. Ong, University Treasurer, Edison B. Sasoy, Vice President for Administration, Fr. Roberto C. Yap, SJ, University President, Mr. Cricket Santiago, President.... See More
 
Shaping the Leaders of Tomorrow
Techworld Date Posted: 2:55 PM | 193 Views
From left: Harriet B. Fernandez, Director, Computing and Information Services Office, Lennie K. Ong, University Treasurer, Edison B. Sasoy, Vice President for Administration, Fr. Roberto C. Yap, SJ, University President, Mr. Cricket Santiago, President...See More

 
How We (Lenovo) See a World Powered by AI
Techworld Date Posted: 28 July 2017 3:54 PM | 245 Views
Ask 10 people what does AI do, and you'll likely get 10 different answers. And many of them would be correct. That's the beauty of AI; it's capable of so many things.. See More
 
How We (Lenovo) See a World Powered by AI
Techworld Date Posted: 3:54 PM | 245 Views
Ask 10 people what does AI do, and you'll likely get 10 different answers. And many of them would be correct. That's the beauty of AI; it's capable of so many things.See More

 
ShadowPad: How Attackers Hide Backdoor in Software Used by Hundreds of Large Companies around the World
Techworld Date Posted: 17 August 2017 3:12 PM | 158 Views
Kaspersky Lab experts have discovered a backdoor planted in a server management software product used by hundreds of large businesses around the world. When activated, the backdoor allows attackers to download further malicious modules.... See More
 
ShadowPad: How Attackers Hide Backdoor in Software Used by Hundreds of Large Companies around the World
Techworld Date Posted: 3:12 PM | 158 Views
Kaspersky Lab experts have discovered a backdoor planted in a server management software product used by hundreds of large businesses around the world. When activated, the backdoor allows attackers to download further malicious modules...See More

 
Group Behind VenusLocker Switches from Ransomware to Monero Mining
Techworld Date Posted: 11 January 2018 10:36 AM | 218 Views
There is no doubt that cryptocurrency has been on a steady rise. According to a research paper by the University of Cambridge, . See More
 
Group Behind VenusLocker Switches from Ransomware to Monero Mining
Techworld Date Posted: 10:36 AM | 218 Views
There is no doubt that cryptocurrency has been on a steady rise. According to a research paper by the University of Cambridge, See More

 
NVIDIA and BINUS University Collaborate on First AI R and D Centre in Indonesia
Techworld Date Posted: 29 August 2017 4:58 PM | 176 Views
NVIDIA today announced a collaboration with BINUS University and Kinetica to establish the first artificial intelligence (AI) research and development (R&D) centre in Indonesia. Located at the university's Anggrek Campus, the centre will support BINUS.... See More
 
NVIDIA and BINUS University Collaborate on First AI R and D Centre in Indonesia
Techworld Date Posted: 4:58 PM | 176 Views
NVIDIA today announced a collaboration with BINUS University and Kinetica to establish the first artificial intelligence (AI) research and development (R&D) centre in Indonesia. Located at the university's Anggrek Campus, the centre will support BINUS...See More

 
F5 Named a WAF Leader by Independent Research Firm
Techworld Date Posted: 5 September 2018 3:35 PM | 54 Views
F5 Networks (NASDAQ: FFIV) just announced that it has been named a Leader in the Forrester Wave™: Web Application Firewalls, Q2 2018 report, published June 25, 2018. . See More
 
F5 Named a WAF Leader by Independent Research Firm
Techworld Date Posted: 3:35 PM | 54 Views
F5 Networks (NASDAQ: FFIV) just announced that it has been named a Leader in the Forrester Wave™: Web Application Firewalls, Q2 2018 report, published June 25, 2018. See More

 
Free YouTube Now Also Available to All Smart, Sun Postpaid Customers
Techworld Date Posted: 2 June 2018 10:16 AM | 221 Views
You can now enjoy watching more videos on the go as PLDT wireless arm Smart Communications, Inc. (Smart) is now also giving all postpaid customers up to one hour of free access to YouTube.... See More
 
Free YouTube Now Also Available to All Smart, Sun Postpaid Customers
Techworld Date Posted: 10:16 AM | 221 Views
You can now enjoy watching more videos on the go as PLDT wireless arm Smart Communications, Inc. (Smart) is now also giving all postpaid customers up to one hour of free access to YouTube...See More


Power by

Download Free AZ | Free Wordpress Themes