Tuesday, January 28, 2025
HomePhishingThese Google Play Apps are Steal your Instagram Credential -Beware

These Google Play Apps are Steal your Instagram Credential -Beware

Published on

SIEM as a Service

Follow Us on Google News

ESET Security Discovered 13 malicious apps which performing to steal your instagram creditionals .These apps has been installed almost 1.5 Millions users .

These 13 apps are tricking  user by the way of encouraging to boost instagram followers. Under the detection name Android/Spy.Inazigram .

According to ESET Report ,The apps were phishing for Instagram credentials and sending them to a remote server.

How it works :

According to the Report from ESET,

  • Harvesting Instagram Credentials and sending them to a remote server
  • The apps promised to rapidly increase the number of followers, likes and comments on one’s Instagram account .
  • It requires the user to log in via an Instagram lookalike screen
  • The Credentials entered into the form are then sent to the attackers’ server in plain text
  • After having entered the credentials, the user will find it impossible to log in, as explained in an “incorrect password” error screen.

After Credentials Stolen, it use compromised accounts for spreading spam and ads, there are also various “business models” in which the most valuable assets are followers, likes and comments. ESET said.

Protection Method :

ESET Suggest few way to protect from steal your  Instagram Credentials .

  1. If you have knowly downloaded one of these apps . you will get a notice from instagram as “some one  attempting to log into your account  “
  2. Uninstall one of above mentioned apps and clear the application data in your memory.
  3. Change the instagram password immidiately . if you have used same password in multiple platform means ,change the all the passwords.
  4. Verify the application before install the applciation in your mobile .check the popularity of its developer by numbers of installs, ratings and, most importantly, content of reviews.

Also Read :

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials

Researchers have identified a sophisticated phishing tactic leveraging Cloudflare's workers.dev, a free domain name...

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....