Gemalto is now part of the Thales Group, find out more.
Skip to content
Gemalto: Security to be free
Our blogs: Conversations around digital security
Search
Back to articles
  • Home
  • Mobile
  • Enterprise Security
  • IoT
  • Financial Services
  • Government
  • Software Monetization
  • Featured Bloggers
    • Gemalto (658)
    • Manfred Kube (113)
    • Tim Cawsey (83)
    • Jennifer Dean (62)
    • Marta Bordonada (59)
    • Rémi de Fouchier (53)
    • Arta Sylejmani (41)
    • Dominique Brulé (38)
    • Philippe Benitez (37)
    • Didier Benkoel-Adechy (32)
    • Maria Barbieri (30)
    • Kristel Teyras (24)
    • Xavier Larduinat (21)
    • Haider Iqbal (21)
    • Sebastien Violette (20)
    • Frederic Martinez (20)
    • Neville Pattinson (20)
    • Sophie Bessin-Py (19)
    • John Ahlberg (19)
    • Ken Abbott (19)
    • Brittany Jedrzejewski (18)
    • Nicole Williams (14)
    • Isabelle Lodo (13)
    • Sek Leong (12)
    • Jennifer Hindle (12)
    • Axel Hansmann (10)
    • Sharon Ginga (10)
    • Cecile Eurendjian (10)
    • Christian Hartwigsson (8)
    • Kim Depussé (8)

    Latest blog posts by:

    • Philippe BenitezPhilippe Benitez
    • Ken AbbottKen Abbott
    • Didier Benkoel-AdechyDidier Benkoel-Adechy
    • John AhlbergJohn Ahlberg
    • Florent AbatFlorent Abat
    • Sophie Bessin-PySophie Bessin-Py
    See all bloggers
  • Blogroll
    • Amrit Williams blog
    • Communities Dominate Brands
    • GoMo News
    • HIT Consultant
    • ID Theft Security
    • Independent Identity
    • Kantara Initiative
    • Krebs on Security
    • Life as a Healthcare CIO
    • Michael N. Dundas
    • Mobile Marketer Blog
    • Mobile Marketing Watch
    • Mobile Money Asia
    • Mobile Zeitgeist
    • MSearchGroove (MSG)
    • Musings of a mobile marketer
    • Naked Security
    • Network Security Blog
    • NFC World
    • RFID Journal
    • Ric Ferraro's Blog
    • Schneier on Security
    • SecDev
    • Security Nirvana
    • Virginia Benedict
  • Countries
    • Brazil
    • China
    • France
    • Germany
    • Italy
    • Japan
    • Kenya
    • South Korea
    • Spain
    • Turkey
    • UK
    • US
  • Tags
    • Apple
    • Authentication
    • BYOD
    • Banking
    • Biometrics
    • Cloud
    • Connected devices
    • Contactless
    • Convenience
    • Cybersecurity
    • Data breach
    • Digital Security
    • EMV
    • Ebanking
    • Encryption
    • Facebook
    • Fraud
    • Gemalto
    • IOT
    • Identity
    • Innovation
    • Internet of things
    • LTE
    • M2M
    • MWC
    • Machine-to-machine
    • MasterCard
    • Mobile wallet
    • Mobile marketing
    • Mobile
    • Mobile payment
    • Mobile payments
    • Mobile World Congress
    • Multi-factor authentication
    • NFC
    • OTP
    • Online banking
    • Password
    • Passwords
    • Payments
    • SIM
    • SMS
    • Security
    • Smartphone
    • Strong authentication
    • Technology
    • Trust
    • Two factor authentication
    • USA
    • Visa
Back to articles

Posted on 07 September 2017 by Gemalto in Enterprise Security

Following Instagram breach, users urged: Protect accounts with 2FA

Last updated: 11 September 2017

Following an API vulnerability Instagram breachprivately reported by Kaspersky Lab to Instagram, the Facebook-owned service issued a warning to its high-profile users, urging them to use 2FA to protect their accounts, as well as to exercise caution in relation to suspicious emails, phone calls and text messages. The security hole caught Kaspersky Lab’s attention after their researchers spotted celebrities’ personal details being offered for sale in an underground forum.

Shortly after reporting the initial news of the Instagram breach, security publisher Ars Technica received an email from a person who claims to have pilfered details of six million Instagram accounts. This person also claimed that they are now peddling the phone numbers and email addresses of these accounts on an online blackmarket store, selling them at $10 a search. Each search yields a phone number or email address, if available. To establish their credibility, the hacker provided a sample of 10,000 records, which after further investigation by Ars, appear to be genuine.

Kaspersky Lab reported that the flaw relied on exploiting an older version of the Instagram app released last year, and that it utilized the password-reset option. Instead of directing the password-reset request to Instagram’s servers, the attackers sent it to a web proxy. This enabled them to get their hands on the request’s code, replace the original username with that of a targeted celebrity, and then forward it to Instagrams’ genuine servers. The latter, in turn, replied with the targeted celebrity’s email address and phone number.

Instagram has since patched the API hole, and according to its statement the bug could only be “used to access some people’s email address and phone number even if they were not public. No passwords or other Instagram activity was revealed.”

Was the vulnerability in question tied to the Selena Gomez Instagram incident, in which private pics of her ex were unknowingly posted on her account? Looking at the Instagram statement, and the records being sold in the underground, no passwords were revealed—so there is no clear connection. Theoretically, one could use the pilfered phone number and email for an attack involving social engineering, such as a phishing or SMiShing attack.

In any event, by turning on two-factor authentication, Instagram is urging its users to step up their security. With 2FA enabled, each time an account is accessed from a new or unrecognized device, Instagram users are required to enter a one-time-passcode sent to them via an SMS text message, substantially mitigating the risk of various types of abuse and exploits.

How do you protect your users from an incident like Instagram’s breach? Learn how multi-factor authentication can help you thwart different types of attacks. Read the Security Survey of Strong Authentication Technologies – White Paper, or visit Safenet.Gemalto.com/Multi-Factor-Authentication.

 

 

 

Related posts:

Securing the Enterprise at the IoT Solutions World Congress

Posted on 06 October 2018 by Gemalto in Corporate

Is your organization one of the many organizations that are embracing the Internet of Things (IoT) as part of their digital transformation? If so, and you're attending IoT Solutions World…

7 Key Factors for Enabling Trust in the Drone Ecosystem

Posted on 08 March 2018 by Didier Benkoel-Adechy in Corporate

From pilot ID verification and drone ID registration to the secure transmission and protection of data, we look at the key success factors for commercial drones to soar.

White House Cybersecurity Chief Reflects on First Two Months

Posted on 07 August 2012 by Neville Pattinson in Corporate

Cybersecurity and the White House have been in the news for the past week after the Obama administration’s cybersecurity bill was blocked in the Senate on August 2nd, despite the…

From Twitter

Loading...
    More from Twitter

    Subscribe to updates

    Delivered by FeedBurner.
    Submitting this form will open a popup window to the FeedBurner website.

    Gemalto: a Thales company
    Visit Gemalto corporate site | Blogs FAQ | Privacy Policy | © 2006 - 2023 Gemalto NV
    This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

    • ACTIVITIES
    • Defence & Security
    • Digital Identity and Security
    • Aerospace
    • Space
    • Ground Transportation
    • Market-specific solutions
    • GLOBAL
    • Career
    • Investor
    • Journalist
    • Customer Online
    • SOCIAL NETWORKS
    • Facebook
    • Twitter
    • LinkedIn
    • Instagram
    • Youtube
    Decisive technology for decisive moments
    www.thalesgroup.com
    Be aware that this site uses cookies. Before continuing browsing we advise you to click on Privacy Policy to access and read our cookie policy.OkPrivacy policy