Nasty Phishing Scam Targets Instagram

Phishing scam emails have recently become a very popular hacking attack method.  

Instagram is cautioning users not to fall for a new phishing scam which is trying to collect log-ins and hack users accounts. It is spreading like wild-fire across the Instagram social network. The scam looks like a selection of pictures ranked by hotness.

The thing about Instagram is that trends are usually spreading like wildfire all across the platform. This is one of the reasons why so many people love using it on a regular basis, but the fact of the matter is that a lot of the users that tend to use Instagram like this need to know about a little thing called the Nasty List. 

The way that the Nasty List works is that you get a message with a link to what is ostensibly a Nasty List for Instagram, which is basically supposed to be a list of users that have done strange or off putting things. 

If you click on the link, you will be taken to a login page that looks like the login page for Instagram. You will be asked to log in before you can actually look at the various entries in the nasty list, and when you enter your details, such as username/email id and password, hackers are going to be able to steal this information.

Twitter users who have posted screenshots of the scam. First Instagram users will receive a message from someone they know saying that you are on ‘The Nasty List’ and then if you sign in you will be taken to what looks like an Instagram log-in page and soon someone will attempt to hack your account. 

If you click on the link in the message you’ll be taken to one of several Instagram profiles apparently registered for the purpose, with names like “the_nasty_list_848.” This is because of the fact that the login page that you are going to be taken to does not actually belong to Instagram, it is just a front put up by hackers that are going to make it so that you would end up trusting the page and putting in your account details. 

This is a very common phishing technique that a lot of hackers tend to use in order to make the most of the kind of information that they are trying to obtain from a particular platform. You should be wary of such tricks because of the fact that it can sometimes end up compromising your security on the Internet all in all.

Phishing is currently the most frequently used methods to hack people’s accounts and the amount of philshing emails has more than doubled in the last year or so. 

Inforsecurity:        DigitalvInfromation World:      FCW

You Might Also Read:

The Top 5 Malware Attack Types:


 

« The IoT Is A Big Headache For Software Developers
Social Media Crime Is A Threat To Business »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cybercrypt

Cybercrypt

Cybercrypt is a world leading system provider in robust cryptography. Protecting critical assets, applications and sensitive data.

Sandline Discovery

Sandline Discovery

Sandline Discovery provides digital forensics, eDiscovery solutions, managed review and litigation consulting services.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

RevBits

RevBits

RevBits provides high-performance cybersecurity solutions including email security, endpoint security, deception technology and PAM solution to enterprise companies and public sector organizations.

Innefu Labs

Innefu Labs

Innefu is an Information Security R&D startup, providing cutting edge Information Security & Data Analytics solutions.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

Alkira

Alkira

Alkira has reinvented networking for the cloud era by delivering the network cloud, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity.

Psybersafe

Psybersafe

Psybersafe is a hands-on, behaviour-changing training system that keeps your people and your business cyber safe.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

Camms

Camms

Camms are a team of experienced professionals dedicated to providing innovative GRC software solutions that help organizations manage risk, make informed decisions, and drive positive change.

Hurricane Labs

Hurricane Labs

Hurricane Labs is a managed security services provider (MSSP) that focuses on Splunk.

Inoxoft

Inoxoft

Inoxoft delivers IT security consulting, assessment, and protection services to help businesses secure their infrastructure, applications, and sensitive data.