Tuesday, December 3, 2024
HomePhishingThese Google Play Apps are Steal your Instagram Credential -Beware

These Google Play Apps are Steal your Instagram Credential -Beware

Published on

SIEM as a Service

ESET Security Discovered 13 malicious apps which performing to steal your instagram creditionals .These apps has been installed almost 1.5 Millions users .

These 13 apps are tricking  user by the way of encouraging to boost instagram followers. Under the detection name Android/Spy.Inazigram .

According to ESET Report ,The apps were phishing for Instagram credentials and sending them to a remote server.

- Advertisement - SIEM as a Service

How it works :

According to the Report from ESET,

  • Harvesting Instagram Credentials and sending them to a remote server
  • The apps promised to rapidly increase the number of followers, likes and comments on one’s Instagram account .
  • It requires the user to log in via an Instagram lookalike screen
  • The Credentials entered into the form are then sent to the attackers’ server in plain text
  • After having entered the credentials, the user will find it impossible to log in, as explained in an “incorrect password” error screen.

After Credentials Stolen, it use compromised accounts for spreading spam and ads, there are also various “business models” in which the most valuable assets are followers, likes and comments. ESET said.

Protection Method :

ESET Suggest few way to protect from steal your  Instagram Credentials .

  1. If you have knowly downloaded one of these apps . you will get a notice from instagram as “some one  attempting to log into your account  “
  2. Uninstall one of above mentioned apps and clear the application data in your memory.
  3. Change the instagram password immidiately . if you have used same password in multiple platform means ,change the all the passwords.
  4. Verify the application before install the applciation in your mobile .check the popularity of its developer by numbers of installs, ratings and, most importantly, content of reviews.

Also Read :

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New Phishing Attack Targeting Corporate Internet Banking Users

A sophisticated phishing scam has surfaced in Japan, targeting corporate internet banking users.This...

APT-C-60 Attacking HR Department With Weaponized Resumes

APT-C-60 launched a phishing attack in August 2024, targeting domestic organizations with malicious emails...

Shut Down Phishing Attacks -Detection & Prevention Checklist

In today's interconnected world, where digital communication and transactions dominate, phishing attacks have become...