Instagram is not just the second most popular social network in the world, but also a means of income for numerous photobloggers, models, and other Internet celebrities. Eye-catching accounts with many thousands of followers are of interest not only to fans, but also to cybercriminals. If such an account is stolen, the consequences can be nasty. But how exactly do Instagram accounts get hijacked, and how can you avoid yours getting snared?

 

Hijack method no. 1: fake verification
You’ve probably noticed a blue tick next to some Instagram accounts, a Verified Badge. These status symbols are worn by accounts belonging to celebrities, large companies, and popular bloggers. The sacred badge is especially important for accounts with large audiences because it adds prestige, and distinguishes these accounts from the fake ones. Getting hold of a badge isn’t that easy: there’s no application form or “badge store”— the social network decides for itself who to award them to.

 

How to get verified on Instagram? You can’t. On Twitter, there was a time when it was possible to get verified user status by filling out a form and providing data to prove who you are. But there’s nothing like this on Instagram.

 

However, many users are unaware that account owners have no influence over the appearance of the cherished blue tick. And this is a fact that’s being exploited by scammers. Cybercriminals are creating sites that masquerade as Instagram help center pages, and these request details from Instagram users such as their username, password, email address, first name, last name, and date of birth — all for the promise of a badge.

 

Having entered this data, the unsuspecting user is told to wait 24 hours for a decision, and not to change their account settings during this period. The information goes straight to the attackers, while the user just sits and waits, unaware that their account is now compromised.

 

This method can also be used to get personal information belonging to the victim, which can help the cybercriminals bypass two-factor authentication processes. To do this, criminals display a message saying that the support service may contact the account owner to clarify their details.

 

When the “support service” does make contact, it’s the scammers themselves asking for an SMS code or other security information. Scammers might also send a fake support service message requesting information supposedly needed for verification, which they can use when dealing with the real support service behind the account owner’s back (the data requested might include, for example, a photo or other data that the genuine service might ask for).

 

Hijack method no. 2: plain old phishing
Scammers are also continuing to use common phishing techniques to lure the victim to a fake login or password reset page. For example, they might send a scary message saying that the user’s account has been hacked or that their login credentials need updating, or simply offer to “rate a photo” which supposedly requires the user to login to the social network.

 

With more than a billion users worldwide, Instagram has long been a target of choice for all kinds of scammers. Having hijacked an account, they get access to the user’s personal information and messages. Not only that, the account can be used to spread spam, phishing, and malicious content.

 

Quite often, on taking possession of an account, the attackers change the handle, profile photo, and email address and phone number to which it is linked. That makes it nearly impossible for the true owner to restore access to their Instagram account.

 

How to protect against Instagram hijacking

 

As always, prevention is better than cure — especially if curing is next to impossible. By observing these simple rules, you can stay safe:

  • Don’t click on suspicious links.
  • Always check the address bar for the URL of the web page. If instead of Instagram.com it says something like 1stogram.com or instagram.security-settings.com, get out of there quick, and don’t even think about entering any personal data on pages like this.
  • Only use the official social network app from the official store — such as Google Play for Android, or App Store for iOS.
  • Don’t use account login credentials for authentication on third-party services and apps.
  • Use a reliable security solution that sifts out suspicious messages and blocks phishing pages. Kaspersky Internet Security can handle that task for you.

 


RECOMMENDED ARTICLE FOR TECHWORLD


 
Building Safety Must-Haves Available At WOSAS 2018
Techworld Date Posted: 13 November 2018 4:10 PM | 205 Views
Due to overwhelming public demand, WOSAS (World of Safety and Security) and WOCEE (World of Consumer Electronics Exposition) are back again this year. See More
 
Building Safety Must-Haves Available At WOSAS 2018
Techworld Date Posted: 4:10 PM | 205 Views
Due to overwhelming public demand, WOSAS (World of Safety and Security) and WOCEE (World of Consumer Electronics Exposition) are back again this yearSee More

 
Global Shipments of FUJITSU Image Scanners Have Passed the 10 Million Mark
Techworld Date Posted: 30 September 2017 9:58 AM | 223 Views
PFU is proud to announce that as of July 2017, global shipments of its FUJITSU image scanners have passed the 10 million mark.. See More
 
Global Shipments of FUJITSU Image Scanners Have Passed the 10 Million Mark
Techworld Date Posted: 9:58 AM | 223 Views
PFU is proud to announce that as of July 2017, global shipments of its FUJITSU image scanners have passed the 10 million mark.See More

 
Transcend’s Gives Advice in Selecting the Right Dashcam for Your Needs
Techworld Date Posted: 20 September 2017 11:06 AM | 240 Views
The dashcam, or dashboard camera, has become an essential vehicle accessory primarily because of solid evidence that it aids with self-protection. Transcend Information Inc., a leading manufacturer of storage and multimedia products, has come.... See More
 
Transcend’s Gives Advice in Selecting the Right Dashcam for Your Needs
Techworld Date Posted: 11:06 AM | 240 Views
The dashcam, or dashboard camera, has become an essential vehicle accessory primarily because of solid evidence that it aids with self-protection. Transcend Information Inc., a leading manufacturer of storage and multimedia products, has come...See More

 
Best Gadgets That Will Make Your Christmas Shopping a Breeze
Techworld Date Posted: 13 November 2018 3:55 PM | 203 Views
Make your Christmas shopping easier this 2018 with Gadget Goods Asia’s Christmas package as they offer five unique travel and work gadgets at great discounts. . See More
 
Best Gadgets That Will Make Your Christmas Shopping a Breeze
Techworld Date Posted: 3:55 PM | 203 Views
Make your Christmas shopping easier this 2018 with Gadget Goods Asia’s Christmas package as they offer five unique travel and work gadgets at great discounts. See More

 
Unlocking Insights for Sustainable Development in ASEAN with Data and Analytics
Techworld Date Posted: 15 December 2017 10:19 AM | 244 Views
Data has become the new life force that drives the world today. Businesses have always leveraged their company or customer information to make better, smarter, real time, fact-based decisions – from developing a new.... See More
 
Unlocking Insights for Sustainable Development in ASEAN with Data and Analytics
Techworld Date Posted: 10:19 AM | 244 Views
Data has become the new life force that drives the world today. Businesses have always leveraged their company or customer information to make better, smarter, real time, fact-based decisions – from developing a new...See More

 
SAP Philippines Officially Recognized as 2019 Top Employer
Techworld Date Posted: 7 January 2019 2:47 PM | 168 Views
SAP Philippines (NYSE: SAP) has been recognized as the 2019 Top Employer, for empowering best people practices and having exceptional employee working conditions.. See More
 
SAP Philippines Officially Recognized as 2019 Top Employer
Techworld Date Posted: 2:47 PM | 168 Views
SAP Philippines (NYSE: SAP) has been recognized as the 2019 Top Employer, for empowering best people practices and having exceptional employee working conditions.See More

 
MSI GAMING PH ANNOUNCES OFFICIAL LAUNCH OF NEW CONCEPT STORE
Techworld Date Posted: 10 November 2017 10:36 AM | 294 Views
Micro-star International (MSI), the world’s best-selling gaming laptop brand, will be having a grand launching celebration of their newest MSI Concept Store on November 16, 2017.. See More
 
MSI GAMING PH ANNOUNCES OFFICIAL LAUNCH OF NEW CONCEPT STORE
Techworld Date Posted: 10:36 AM | 294 Views
Micro-star International (MSI), the world’s best-selling gaming laptop brand, will be having a grand launching celebration of their newest MSI Concept Store on November 16, 2017.See More

 
Fujitsu Develops AI Technology to Determine the Necessity of Cyberattack Responses
Techworld Date Posted: 13 February 2019 9:55 AM | 192 Views
Fujitsu Laboratories Ltd. has announced that it has developed an AI technology that automatically determines whether action needs to be taken in response to a cyberattack. . See More
 
Fujitsu Develops AI Technology to Determine the Necessity of Cyberattack Responses
Techworld Date Posted: 9:55 AM | 192 Views
Fujitsu Laboratories Ltd. has announced that it has developed an AI technology that automatically determines whether action needs to be taken in response to a cyberattack. See More

 
OYO Hotels Launches Operations in the Philippines; To Invest Upwards of $50 Million
Techworld Date Posted: 7 February 2019 8:59 AM | 89 Views
Technology and tourism, when converged effectively, open a myriad of opportunities. OYO, South Asia’s largest, and the world’s fastest-growing chain of hotels, homes and spaces, proves this as it lands in the Philippines.. See More
 
OYO Hotels Launches Operations in the Philippines; To Invest Upwards of $50 Million
Techworld Date Posted: 8:59 AM | 89 Views
Technology and tourism, when converged effectively, open a myriad of opportunities. OYO, South Asia’s largest, and the world’s fastest-growing chain of hotels, homes and spaces, proves this as it lands in the Philippines.See More

 
Cyber-Spy Groups Are Moving towards Using Supply Chain Attacks and Legitimate Tools to Attack Financial Institutions, Warns Kaspersky Lab
Techworld Date Posted: 18 October 2017 1:15 PM | 280 Views
Yury Namestnikov of Kaspersky Lab's Global Research and Analysis Team (GReAT) in Russia discuss the tectonic shift of cyberespionage groups stealing not just data but also money of organizations in the Asia Pacific region. They.... See More
 
Cyber-Spy Groups Are Moving towards Using Supply Chain Attacks and Legitimate Tools to Attack Financial Institutions, Warns Kaspersky Lab
Techworld Date Posted: 1:15 PM | 280 Views
Yury Namestnikov of Kaspersky Lab's Global Research and Analysis Team (GReAT) in Russia discuss the tectonic shift of cyberespionage groups stealing not just data but also money of organizations in the Asia Pacific region. They...See More


Power by

Download Free AZ | Free Wordpress Themes