Skip to main content

How To Hackers Compromise your  Instagram Account



Hackers gain targets high profile or social media influences Instagram accounts with phishing links and gain access to the accounts before the influences even know what’s happening.Based on the Trend Micro’s report the hackers target the Instagram profiles that have followers between 15,000 and 70,000 were hacked and targets range from famous actors and singers to owners of startup businesses like photo shoot equipment rentals.


The attack starts from the Phishing Email which is appears to be from Instagram asking the victim to verify the account to get the Verified badge on the Instagram profile.If the victim clicks on the Verify Account button then it go to the victim to the phishing page that asks for the following user details such as date of birth, email, and credentials.


"Once you submitted your credentials, a badge notification appears, but for only four seconds. This is a trick to give users the impression that their profile has been verified”, reads Trend Micro blog post. But the reality is that the hackers ex-filtrate the credentials".







As the user enters the credentials in the phishing page attackers get access to the credentials and by using the stolen credentials they gain access to the Instagram profiles and modify the user information that requires to recover the stolen account.

Attackers use to change the username of the stolen address to indicate it is hacked and use to change the email address, again and again, to trick victim’s with security emails asking the changes were legitimate Researcher spotted a specific instant in which the hacker, “threatening to delete the account or never return the stolen profile unless the victim pays a ransom or sends nude photos or videos.”

How to safe from phishing Attacks


1) Make a unique Email address.

2) Do not click/open any attachments without proper validation.

3) Do not open emails voluntary emails.

4) Use Spam filters and Anti spam getways.

5) Never reply or clicks on any spam email.

6) Check Grammar and font styles 

Comments

Popular posts from this blog

Alert for Weaponized TeamViewer Installer that delivers njRAT

Alert for Weaponized TeamViewer Installer that  delivers  njRAT   Hazard actors relying on legitimate, 9aaf3f374c58e8c9dcdd1ebf10256fa5 software Team Viewer for exploitation has been a totally commonplace situation. There have been numerous cases in which risk actors used 9aaf3f374c58e8c9dcdd1ebf10256fa5 software to deliver malware to the sufferers. In addition, a latest file from Cyble research & Intelligence Labs stated that the maximum popularly used remote computing device support software program, “Team Viewer” has been exploited by threat actors to deliver njRAT malware. Other software that become turning in njRAT malware include Wireshark, system Hacker, and so on., NJ RAT is a far flung get admission to Trojan that could perform keylogging, password stealing, facts exfiltration, gaining access to webcams, and microphones, downloading extra documents, and plenty of others. It changed into first determined in 2012 and was attacking companies in middle Japanese c...

SIM swap attack permits Hackers Port a phone quantity to a brand new SIM to Hack WhatsApp & Evasion 2FA.

SIM swap attack permits Hackers Port a phone quantity to a brand new SIM to Hack WhatsApp & Evasion 2FA. Cybercriminals are actively performing SIM swap attacks in diverse international locations to bypass 2 things Authentication and to compromise the numerous social media apps which include WhatsApp through porting a sufferer’s smartphone number to a brand new SIM card. This widespread assault brought on economic damages, stolen credentials, and seizes OTPs to bypass victims’ online money owed. There are various fraud facilities and thousands of operators are running round the arena to seamlessly port a cell phone wide variety to a new SIM with an excessive achievement ratio.   In this situation, countries like Brazil and Mozambique have an excessive fee of SIM swap fraud the use of various social engineering strategies, and phishing attacks. A hit tries of this assault allow fraudsters take manage of clients’ telephone numbers with a purpose to get hold of mobile money tran...

Former protection Engineer Arrested for Stealing $9 Million from Crypto alternate.

  Former protection Engineer arrested for stealing $9 Million from Crypto alternate. Shakeeb Ahmed, a former safety engineer, has been arrested for defrauding a decentralized crypto trade and stealing over $nine million. A digital currency trading, also known as a crypto currency alternate (DCE), is an enterprise that permits individuals to trade crypto currencies or digital currencies for different property, inclusive of conventional fiat money or other digital currencies. This marks the first crook case involving a smart agreement operated via a decentralized alternate. Vulnerability in Crypto exchange’s clever Contracts In July 2022, Ahmed took gain of vulnerability in clever contracts and inserted fake pricing facts, ensuing in fraudulent gains of about $9 million. He also utilized “flash loans” to defraud the crypto trade. Using his specialised capabilities as a senior protection engineer, he forcefully carried out the assault through reverse engineering smart contracts ...