Friday, September 29, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • Cyber Week 2023 & The Israel National Cyber Directorate Presents - Academic Perspectives on Cybersecurity Challenges
  • Federal Shutdown Raises Cybersecurity Risks, Experts Warn
  • Cryptomining Attacks: The Stealth Threat to Your Cloud Security
  • National Cybersecurity Infrastructure Efforts Bearing Fruit
  • What Is mTLS? The Essential Guide You Can’t Afford to Miss
Data Security Digital Currency SBN News Security Bloggers Network 

Home » Cybersecurity » Data Security » Criminals Holding Hijacked Instagram Influencers’ Accounts for Ransom

SBN

Criminals Holding Hijacked Instagram Influencers’ Accounts for Ransom

by David Bisson on October 4, 2018

Criminals are hijacking Instagram influencers’ accounts and demanding that victims pay a ransom in bitcoin to regain access.

AWS Builder Community Hub

Kevin Kreider, a Los Angeles-based Instagrammer who’s known for his following around fitness-related topics, told Motherboard that extortionists first targeted him when someone named Lana reached out with a fake business opportunity. Posing as a press relations staffer from fashion company French Connection, Lana offered a sponsorship deal and sent over a link shortened with Bit.ly to the company’s own Instagram account. After being clicked by Kreider, the link redirected him to a fake login page designed to steal his Instagram credentials.

“I was at the gym going through my emails and thought it was an opportunity with a brand I respected and thought I could put on my Instagram, and when I saw that my Instagram [@kevin.kreider] disappeared from my app, my heart dropped to my stomach,” Kreider said to Motherboard.

Shortly thereafter, those responsible for hijacking Kredier’s account contacted him and demanded a ransom payment. The Instagram influencer ultimately paid $110. Even so, the criminals deleted his account, as it became unsearchable. He said he eventually retrieved his account, though it’s not clear how at the time of this writing.

Kreider is just one influencer on Instagram whom criminals have recently targeted with account takeover and extortion attacks. As reported by Motherboard, something similar happened to Lindsey Simon. She used the services of a computer-savvy friend to delay the ransom payment process and eventually recover her password. And then there’s Anna Wood, an influencer with over 50,000 followers who regained access to her hijacked Instagram account only after her followers posted her story on the platform.

Cassie Gallegos, a lifestyle-based Instagram influencer, wrote about how she reacted to a success account takeover attack in a blog post:

(Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/criminals-holding-hijacked-instagram-influencers-accounts-for-ransom/

October 4, 2018October 4, 2018 David Bisson Bitcoin, hacker, Instagram, IT Security and Data Protection, Latest Security News
  • ← Ethereum security guidance for all
  • Canada advances cybersecurity strategy to fend off nation-state attacks →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Oct 03

Way Too Vulnerable: Uncovering the State of the Identity Attack Surface

October 3 @ 11:00 am - 12:00 pm
Oct 11

ASPM: Leveling the AppSec Playing Field

October 11 @ 1:00 pm - 2:00 pm
Oct 16

Shadow Access: Where IAM Meets Cloud Security

October 16 @ 3:00 pm - 4:00 pm
Oct 17

Securing Cloud-Native Applications Across the Software Development Life Cycle

October 17 @ 11:00 am - 12:00 pm
Oct 18

Live Workshop on ‘SCA 2.0’: Using Runtime Analysis to Find High-Risk SCA Vulnerabilities

October 18 @ 12:00 pm - 1:30 pm
Oct 19

Managing Security Posture and Entitlements in the Cloud

October 19 @ 1:00 pm - 2:00 pm
Oct 24

When Seconds Matter: Real-Time Cloud Security With AWS and Sysdig

October 24 @ 11:00 am - 12:00 pm
Oct 24

Reporting From the Pipeline: The State of Software Security in DevOps

October 24 @ 1:00 pm - 2:00 pm
Oct 26

How to Shift Left the Right Way

October 26 @ 3:00 pm - 4:00 pm
Oct 30

Zero-Trust

October 30 @ 1:00 pm - 2:00 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

Most Read on the Boulevard

Building Your Incident Response Team
ZenRAT Targets Windows Users with Fake Bitwarden Site
Qakbot Takedown Resembles Hack Back, Will Botnet, Malware Be Resurrected?
China-Backed Hacks of Cisco Routers Worry Feds — BlackTech Revenge?
More iOS Zero Days, More Mercenary Spyware — This Time: Cytrox Predator
Insider Risk Digest: Week 37-38
Cyber Week 2023 & The Israel National Cyber Directorate Presents – Embracing the Quantum Computing Revolution: Unleashing the Opportunities for Cybersecurity
Google LibWebP Arbitrary Code Execution Vulnerability (CVE-2023-5129) Notification
Unlock Cyber Security as a Service: 2023 Insights!
What is digital trust, and why is it at risk

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

Lawsuit Filed Against Google, Meta, H&R Block for Sharing Taxpayer Data
Cyberlaw Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight News Security Boulevard (Original) Spotlight 

Lawsuit Filed Against Google, Meta, H&R Block for Sharing Taxpayer Data

September 28, 2023 Jeffrey Burt | Yesterday 0
Xenomorph Android Banking Trojan Makes Landfall in US
Application Security Cybersecurity Data Security Featured Identity & Access Industry Spotlight Malware Mobile Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Xenomorph Android Banking Trojan Makes Landfall in US

September 26, 2023 Jeffrey Burt | 2 days ago 0
More iOS Zero Days, More Mercenary Spyware — This Time: Cytrox Predator
Analytics & Intelligence API Security Application Security AppSec Cloud Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security Deep Fake and Other Social Engineering Tactics Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Insider Threats Malware Mobile Security Most Read This Week Network Security News Popular Post Regulatory Compliance Securing the Cloud Securing the Edge Security at the Edge Security Awareness Security Boulevard (Original) Social Engineering Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

More iOS Zero Days, More Mercenary Spyware — This Time: Cytrox Predator

September 25, 2023 Richi Jennings | 4 days ago 0

Top Stories

Federal Shutdown Raises Cybersecurity Risks, Experts Warn
Analytics & Intelligence CISO Suite Cybersecurity Featured Governance, Risk & Compliance Incident Response IoT & ICS Security News Security Boulevard (Original) Social - Facebook Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Federal Shutdown Raises Cybersecurity Risks, Experts Warn

September 29, 2023 Nathan Eddy | 4 hours ago 0
National Cybersecurity Infrastructure Efforts Bearing Fruit
Analytics & Intelligence CISO Suite Cyberlaw Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Incident Response News Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence 

National Cybersecurity Infrastructure Efforts Bearing Fruit

September 29, 2023 Nathan Eddy | 5 hours ago 0
China-Backed Hacks of Cisco Routers Worry Feds — BlackTech Revenge?
Analytics & Intelligence API Security Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps DevSecOps Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response IOT IoT & ICS Security Malware Most Read This Week Network Security News Popular Post Securing the Cloud Securing the Edge Security at the Edge Security Awareness Security Boulevard (Original) Security Challenges and Opportunities of Remote Work Security Operations Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

China-Backed Hacks of Cisco Routers Worry Feds — BlackTech Revenge?

September 28, 2023 Richi Jennings | Yesterday 0

Security Humor

a PRC flag flies in a stiff breeze

China-Backed Hacks of Cisco Routers Worry Feds — BlackTech Revenge?

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.