Categories: Phishing

These Google Play Apps are Steal your Instagram Credential -Beware

ESET Security Discovered 13 malicious apps which performing to steal your instagram creditionals .These apps has been installed almost 1.5 Millions users .

These 13 apps are tricking  user by the way of encouraging to boost instagram followers. Under the detection name Android/Spy.Inazigram .

According to ESET Report ,The apps were phishing for Instagram credentials and sending them to a remote server.

How it works :

According to the Report from ESET,

  • Harvesting Instagram Credentials and sending them to a remote server
  • The apps promised to rapidly increase the number of followers, likes and comments on one’s Instagram account .
  • It requires the user to log in via an Instagram lookalike screen
  • The Credentials entered into the form are then sent to the attackers’ server in plain text
  • After having entered the credentials, the user will find it impossible to log in, as explained in an “incorrect password” error screen.

After Credentials Stolen, it use compromised accounts for spreading spam and ads, there are also various “business models” in which the most valuable assets are followers, likes and comments. ESET said.

Protection Method :

ESET Suggest few way to protect from steal your  Instagram Credentials .

  1. If you have knowly downloaded one of these apps . you will get a notice from instagram as “some one  attempting to log into your account  “
  2. Uninstall one of above mentioned apps and clear the application data in your memory.
  3. Change the instagram password immidiately . if you have used same password in multiple platform means ,change the all the passwords.
  4. Verify the application before install the applciation in your mobile .check the popularity of its developer by numbers of installs, ratings and, most importantly, content of reviews.

Also Read :

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

View Comments

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

9 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

10 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

12 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

16 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

17 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

17 hours ago