Thursday, January 30, 2025
HomeCyber Security NewsInstagram Hack - How Hacking Group Steals Popular Instagram Profiles

Instagram Hack – How Hacking Group Steals Popular Instagram Profiles

Published on

SIEM as a Service

Follow Us on Google News

Hackers gain targets high-profile or social media influencers Instagram accounts with phishing links and gain access to the accounts before the influencers even know what’s happening.

Based on the Trend Micro’s report the hackers target the Instagram profiles that have followers between 15,000 and 70,000 were hacked and targets range from famous actors and singers to owners of startup businesses like photoshoot equipment rentals.

Instagram Hack – Attack Chain

The attack starts with the Phishing Email that appears to be from Instagram asking the victim to verify the account to get the Verified badge on the Instagram profile.

If the victim clicks on the Verify Account button then it takes the victim to the phishing page that asks for the following user details such as date of birth, email, and credentials.

Instagram Hack

“Once submitted, a badge notification appears, but for only four seconds. This is a trick to give users the impression that their profile has been verified”, reads Trend Micro blog post. But the reality is that the hackers exfiltrate the credentials.

Instagram Hack

As the user enters the credentials in the phishing page attackers get access to the credentials and by using the stolen credentials they gain access to the Instagram profiles and modify the information that requires to recover the stolen account.

Attackers use to change the username of the stolen address to indicate it is hacked and use to change the email address, again and again, to trick victim’s with security emails asking the changes were legitimate.

Researcher spotted a specific instant in which the hacker, “threatening to delete the account or never return the stolen profile unless the victim pays a ransom or sends nude photos or videos.”

Also, a hacking forum was found that tells how to manage stolen account’s so that the owners cannot get it back with the Instagram account retrieval process.

How to stay safe With Phishing

  1. Have a unique Email address.
  2. Do not open any attachments without proper validation.
  3. Don’t open emails voluntary emails.
  4. Use Spam filters & Antispam gateways.
  5. Never respond to any spam emails.
  6. Check for Grammar and font styles.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Master in Wireshark Network Analysis to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

OPNsense 25.1 Released, What’s New!

The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...