{"id":11720,"date":"2018-08-24T09:00:07","date_gmt":"2018-08-24T13:00:07","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/instagram-hijack\/11720\/"},"modified":"2019-11-15T15:22:53","modified_gmt":"2019-11-15T11:22:53","slug":"instagram-hijack","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/instagram-hijack\/11720\/","title":{"rendered":"How Instagram accounts get hijacked"},"content":{"rendered":"<p><strong><br>\n(Post updated on August 29; Instagram has introduced applying for verification)<br>\n<\/strong><\/p>\n<p>Instagram is not just the second most popular social network in the world. It\u2019s also a means of income for numerous photo bloggers, models, and other Internet celebrities. Eye-catching accounts with many thousands of followers are of interest not only to fans, but also cybercriminals.  If such an account is stolen, the consequences can be nasty. But how exactly do Instagram accounts get hijacked, and how can you avoid yours getting snared?<\/p>\n<h2>Hijack method No. 1: Fake verification<\/h2>\n<p>You\u2019ve probably noticed a blue tick next to some Instagram accounts, a . Until very recently, these status symbols were worn by accounts belonging to celebrities, large companies, and popular bloggers. The sacred badge is especially important for accounts with large audiences because it adds prestige and distinguishes these accounts from fake ones. Getting hold of a badge wasn\u2019t that easy: There was no application form or \u201cbadge store\u201d\u2014 the social network decided for itself who to award them to.<\/p>\n<p>However, Instagram recently changed its policy regarding verification, and now you can request verification from the app (to do that, go to <em>Settings -&gt; Request Verification<\/em>) and get the badge if your account meets the necessary criteria.<\/p>\n<p>This change was implemented quite recently \u2014 on August 28, 2018 \u2014 and many users don\u2019t know exactly how to get the cherished blue tick. Scammers are, of course, exploiting that, creating sites that masquerade as Instagram help center pages and request details from Instagram users such as their username, password, e-mail address, full name, and date of birth \u2014 all for the promise of a badge.<\/p>\n<p>Having entered this data, the unsuspecting user is told to wait 24 hours for a decision, and not to change their account settings during this period. The information goes straight to the attackers, while the user just sits and waits, unaware that their account is now compromised.<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/08\/23193254\/instagram-hijacking-screen1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/08\/23193254\/instagram-hijacking-screen1.png\" alt=\"\" width=\"974\" height=\"801\" class=\"aligncenter size-full wp-image-11723\"><\/a><\/p>\n<p>This method can also be used to get personal information belonging to the victim, which can help the cybercriminals bypass two-factor authentication processes. To do this, criminals display a message saying that the support service may contact the account owner to clarify their details. When the \u201csupport service\u201d does make contact, it\u2019s the scammers themselves asking for an SMS code or other security information. They might also send a fake support service message requesting information supposedly needed for verification, which they can use when dealing with the real support service behind the account owner\u2019s back (the data requested might include, for example, a photo or other data that the genuine service might ask for).<\/p>\n<h3>Hijack method No. 2: Plain old phishing<\/h3>\n<p>Scammers are also continuing to use common phishing techniques to lure victims to a fake login or password reset page. For example, they might send a scary message saying that a user\u2019s account has been hacked or that their login credentials need updating, or simply offer to \u201crate a photo\u201d which supposedly requires the user to login to the social network.<\/p><div id=\"attachment_11878\" style=\"width: 891px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/08\/23193306\/instagram-hijacking-screen2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11878\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/08\/23193306\/instagram-hijacking-screen2.png\" alt=\"\" width=\"881\" height=\"694\" class=\"size-full wp-image-11878\"><\/a><p id=\"caption-attachment-11878\" class=\"wp-caption-text\">Example of a phishing page mimicking an Instagram login<\/p><\/div>\n<p>With more than a billion users worldwide, Instagram has long been a target of choice for all kinds of scammers. Having hijacked an account, they get access to the user\u2019s personal information and messages. Not only that, the account can be used to spread spam, phishing, and malicious content. Quite often, on taking possession of an account, the attackers change the handle, profile photo, and e-mail address and phone number to which it is linked. That makes it nearly impossible for the true owner to restore access to their Instagram account.<\/p>\n<h3>How to protect against Instagram hijacking<\/h3>\n<p>As always, prevention is better than cure \u2014 especially if a cure is next to impossible. By observing these simple rules, you can stay safe:<\/p>\n<ul>\n<li>Don\u2019t click on suspicious links.<\/li>\n<li>Always check the address bar for the URL of the Web page. If instead of Instagram.com it says something like 1stogram.com or instagram.security-settings.com, get out of there quick, and don\u2019t even think about entering any personal data.<\/li>\n<li>Use the official social network app from the official store \u2014 such as Google Play for Android, or App Store for iOS.<\/li>\n<li>Don\u2019t use account login credentials for authentication on third-party services and apps.<\/li>\n<li>Use a reliable security solution that sifts out suspicious messages and blocks phishing pages. <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Plus<\/a> can handle that task for you.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n<p>Lastly, check out our <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/keep-instagram-secure\/11045\/\" rel=\"noopener noreferrer nofollow\">post on how to configure Instagram properly<\/a>. It\u2019s a must-read for Instagram users.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instagram hacking has been on the rise lately. Here\u2019s what you need to know to avoid losing your precious account.<\/p>\n","protected":false},"author":2473,"featured_media":11721,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486,9],"tags":[1327,734,489,521],"class_list":{"0":"post-11720","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-hijacking","10":"tag-instagram","11":"tag-social-engineering","12":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/instagram-hijack\/11720\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/instagram-hijack\/14013\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/instagram-hijack\/6051\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/instagram-hijack\/16004\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/instagram-hijack\/14286\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/instagram-hijack\/13338\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/instagram-hijack\/16789\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/instagram-hijack\/16178\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/instagram-hijack\/21103\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/instagram-hijack\/23585\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/instagram-hijack\/10857\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/instagram-hijack\/10746\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/instagram-hijack\/9645\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/instagram-hijack\/17521\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/instagram-hijack\/21358\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/instagram-hijack\/23793\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/instagram-hijack\/17146\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/instagram-hijack\/20876\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/instagram-hijack\/20886\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/instagram\/","name":"Instagram"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2473"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=11720"}],"version-history":[{"count":20,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11720\/revisions"}],"predecessor-version":[{"id":14620,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/11720\/revisions\/14620"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/11721"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=11720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=11720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=11720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}