{"id":25997,"date":"2019-03-15T05:26:16","date_gmt":"2019-03-15T09:26:16","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=25997"},"modified":"2019-11-15T06:28:38","modified_gmt":"2019-11-15T11:28:38","slug":"instagram-hijack-new-wave","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/instagram-hijack-new-wave\/25997\/","title":{"rendered":"Instagram accounts hijacked with fake copyright infringement notifications"},"content":{"rendered":"<p>Have you reached a few thousand followers on Instagram? More? Congratulations, you are insta-famous. Among other things, though, being an Instagram influencer means that it\u2019s quite possible that account thieves are after you. A new phishing scheme targeting popular accounts on Instagram is gaining momentum. Here is how it works.<\/p>\n<h2>You\u2019ve got copyright violation notification<\/h2>\n<p>\u201cYour account will be permanently deleted for copyright infringement,\u201d claims an e-mail notification that looks very official. It has the usual Instagram header and logo, and the e-mail address in the <em><em>From<\/em><\/em> field is extremely close to a legitimate one: In most cases it\u2019s either mail@theinstagram.team or info@theinstagram.team.<\/p>\n<p>The e-mail claims that you have just 24 hours (in some versions it\u2019s 48 hours) to appeal and provides a \u201cReview complaint\u201d button. If you click it, you end up on a convincing phishing page, where fraudsters put an image saying they care very much about copyright protection and offer you a link to \u201cAppeal.\u201d To make the scam look even more legitimate, they offer a long list of language choices, although it doesn\u2019t work \u2014 whatever you click, the phishing page always remains in English.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/03\/15052123\/instagram-hijack-new-wave-screenshot.png\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/03\/15052123\/instagram-hijack-new-wave-screenshot.png\" alt=\"A screenshot of phishing e-mail with fake copyright infringement notification on Instagram\" width=\"1460\" height=\"1166\" class=\"aligncenter size-full wp-image-25998\"><\/a><\/p>\n<p>As soon as you click the \u201cAppeal\u201d link, you are invited to input your Instagram credentials. And that\u2019s not the end. Immediately, another message appears: \u201cWe need to verify your feedback and check if your e-mail account matches the Instagram account,\u201d it says. Click \u201cVerify My E-mail Address,\u201d and you\u2019ll see a list of e-mail providers. If you choose yours, you\u2019ll be invited to submit both your e-mail address and (surprise!) the password for your e-mail account.<\/p>\n<p>Then, a \u201cWe will review your feedback\u201d reply appears, but only for few seconds. After that you\u2019ll be redirected to a real Instagram\u2019s website \u2014 another simple trick that lends additional credibility to the scam.<\/p>\n<p>It\u2019s not the first time when Instagram influencers are targeted by scammers. The first wave of phishing was tempting users to apply for <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/instagram-hijack\/23585\/?utm_medium=ipm&amp;utm_source=secnews&amp;utm_campaign=universal\" rel=\"noopener noreferrer nofollow\">a blue \u201cVerified\u201d account badge<\/a>.<\/p>\n<h3>How to protect your Instagram account<\/h3>\n<p>As soon as your data goes to the scammers, they can take over your Instagram profile and modify the information you need to recover it. From there, they can start demanding ransom to give the account back to you, or start spreading spam and all kinds of malicious content using your hijacked account \u2014 not to mention what <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/email-the-hackers-key-to-stealing-your-online-life\/205\/\" rel=\"noopener noreferrer nofollow\">might happen<\/a> if you give away your e-mail password to the scammers too.<\/p>\n<p>Some tips on how to protect your Instagram account:<\/p>\n<ul>\n<li>Don\u2019t click on suspicious links.<\/li>\n<li>Always check the address bar for the URL of the Web page. If instead of Instagram.com it says something like 1stogram.com or instagram.security-settings.com, get out of there quick, and don\u2019t even think about entering any personal data.<\/li>\n<li>Use the official Instagram app from the official store \u2014 such as Google Play for Android, or App Store for iOS.<\/li>\n<li>Never enter account login credentials for authentication on third-party services and apps.<\/li>\n<li>Enable two-factor authentication in both Instagram and your e-mail account.<\/li>\n<li>Use a reliable security solution that sifts out suspicious messages and blocks phishing pages. <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> can handle that task for you.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>To hijack popular Instagram accounts, scammers are sending phishing e-mails with fake copyright infringement notifications.<\/p>\n","protected":false},"author":2508,"featured_media":25996,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[3168,765,76,211,3244],"class_list":{"0":"post-25997","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-copyright","10":"tag-instagram","11":"tag-phishing","12":"tag-social-media","13":"tag-stealers"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/instagram-hijack-new-wave\/25997\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/instagram-hijack-new-wave\/15412\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/instagram-hijack-new-wave\/12979\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/instagram-hijack-new-wave\/17354\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/instagram-hijack-new-wave\/15507\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/instagram-hijack-new-wave\/14200\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/instagram-hijack-new-wave\/18038\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/instagram-hijack-new-wave\/17042\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/instagram-hijack-new-wave\/22414\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/instagram-hijack-new-wave\/5782\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/instagram-hijack-new-wave\/11548\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/instagram-hijack-new-wave\/11586\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/instagram-hijack-new-wave\/10480\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/instagram-hijack-new-wave\/18764\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/instagram-hijack-new-wave\/22801\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/instagram-hijack-new-wave\/23905\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/instagram-hijack-new-wave\/18106\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/instagram-hijack-new-wave\/22285\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/instagram-hijack-new-wave\/22221\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/instagram\/","name":"Instagram"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25997","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2508"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=25997"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25997\/revisions"}],"predecessor-version":[{"id":29502,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25997\/revisions\/29502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/25996"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=25997"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=25997"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=25997"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}