Friday, March 29, 2024

These Google Play Apps are Steal your Instagram Credential -Beware

ESET Security Discovered 13 malicious apps which performing to steal your instagram creditionals .These apps has been installed almost 1.5 Millions users .

These 13 apps are tricking  user by the way of encouraging to boost instagram followers. Under the detection name Android/Spy.Inazigram .

According to ESET Report ,The apps were phishing for Instagram credentials and sending them to a remote server.

How it works :

According to the Report from ESET,

  • Harvesting Instagram Credentials and sending them to a remote server
  • The apps promised to rapidly increase the number of followers, likes and comments on one’s Instagram account .
  • It requires the user to log in via an Instagram lookalike screen
  • The Credentials entered into the form are then sent to the attackers’ server in plain text
  • After having entered the credentials, the user will find it impossible to log in, as explained in an “incorrect password” error screen.

After Credentials Stolen, it use compromised accounts for spreading spam and ads, there are also various “business models” in which the most valuable assets are followers, likes and comments. ESET said.

Protection Method :

ESET Suggest few way to protect from steal your  Instagram Credentials .

  1. If you have knowly downloaded one of these apps . you will get a notice from instagram as “some one  attempting to log into your account  “
  2. Uninstall one of above mentioned apps and clear the application data in your memory.
  3. Change the instagram password immidiately . if you have used same password in multiple platform means ,change the all the passwords.
  4. Verify the application before install the applciation in your mobile .check the popularity of its developer by numbers of installs, ratings and, most importantly, content of reviews.

Also Read :

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles