{"id":18544,"date":"2022-03-18T15:10:42","date_gmt":"2022-03-18T23:10:42","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/18\/news-12277\/"},"modified":"2022-03-18T15:10:42","modified_gmt":"2022-03-18T23:10:42","slug":"news-12277","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/03\/18\/news-12277\/","title":{"rendered":"Beware of this bogus (and phishy) &#8220;Instagram Support&#8221; email"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Fri, 18 Mar 2022 23:05:32 +0000<\/strong><\/p>\n<p>Recently, a fake Instagram email successfully bypassed Google&#8217;s email filters and made it into hundreds of employee inboxes used by a prominent US life insurance company based in New York.<\/p>\n<p>This was revealed in <a href=\"https:\/\/www.armorblox.com\/blog\/the-email-bait-and-phish-instagram-phishing-attack\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">a report by Armorblox<\/a>, a cybersecurity company specializing in stopping business email compromise (BEC) campaigns. According to its threat research team, the spoofed email originated from &#8220;lnstagram Support&#8221; with the email address, <code>membershipform@outlook.com.tr<\/code>. The &#8220;l&#8221; you see in &#8220;Instagram&#8221; is actually a small letter &#8220;L&#8221;. It wouldn&#8217;t have been obvious\u2014if not for Gmail automatically setting the first letter of a sender&#8217;s name in caps\u2014as you can see from the screenshot below.<\/p>\n<p>Clearly, threat actors have layered their campaign with a number of known fraud tactics, one of which is using a homoglyph (or homograph), making this a good example of a <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/out-of-character-homograph-attacks-explained\/\">homograph attack<\/a>, as well.<\/p>\n<p>A homograph attack is a method of deception where threat actors take advantage of how certain character scripts look the same. In this case, a small &#8220;L&#8221; looks the same as a big &#8220;i&#8221;. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"55165\" data-permalink=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/03\/beware-of-this-bogus-and-phishy-instagram-support-email\/attachment\/armorblox-instagram-phish\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-instagram-phish.png\" data-orig-size=\"900,1005\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"armorblox-instagram-phish\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-instagram-phish-269x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-instagram-phish-537x600.png\" loading=\"lazy\" width=\"537\" height=\"600\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-instagram-phish-537x600.png\" alt=\"\" class=\"wp-image-55165\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-instagram-phish-537x600.png 537w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-instagram-phish-269x300.png 269w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-instagram-phish.png 900w\" sizes=\"auto, (max-width: 537px) 100vw, 537px\" \/><figcaption>The fake &#8220;Instagram Support&#8221; email that appeared to have targeted employees of a New York-based insurance firm. (Source: Armorblox)<\/figcaption><\/figure>\n<\/div>\n<p>The initial scam email reads in full: <\/p>\n<pre class=\"wp-block-code\"><code>FROM: Lnstagram Support &lt;<span style=\"background-color: inherit;font-size: inherit;color: initial\">membershipform@outlook.com.tr&gt;<\/span> SUBJECT: Instagram Support MESSAGE BODY: You have been reported for sharing fake content in your membership. and approved by us. You must Verify your membership. If You Can't Verify Within 24 Hours Your membership will be permanently deleted from our servers. You can continue by pressing the Verify button to verify your membership.<\/code><\/pre>\n<p>The phishing email tells the recipient that their Instagram account has been reported for spreading fake or false information, which nowadays is not unheard of and considered a serious breach of Instagram&#8217;s Terms of Service. The scammers then push the recipient to verify their &#8220;membership&#8221; within 24 hours else their Instagram account will be deleted. Incorporating a sense of urgency is a scam red flag because it aims to get users to act first and think later when it&#8217;s too late.<\/p>\n<p>Clicking the verify button takes users to a Google&#8217;s Site page instead of the actual Instagram page\u2014another red flag. Here, users are then asked for their credentials as a requirement for verification.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"55170\" data-permalink=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/03\/beware-of-this-bogus-and-phishy-instagram-support-email\/attachment\/armorblox-fake-instagram-page\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-fake-instagram-page.png\" data-orig-size=\"3584,1914\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"armorblox-fake-instagram-page\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-fake-instagram-page-300x160.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-fake-instagram-page-600x320.png\" loading=\"lazy\" width=\"600\" height=\"320\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-fake-instagram-page-600x320.png\" alt=\"\" class=\"wp-image-55170\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-fake-instagram-page-600x320.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-fake-instagram-page-300x160.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-fake-instagram-page-1536x820.png 1536w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-fake-instagram-page-2048x1094.png 2048w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption>Clicking the Verify button here again directs users to the actual phishing page, as you can see below (Source: Armorblox)<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"55171\" data-permalink=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/03\/beware-of-this-bogus-and-phishy-instagram-support-email\/attachment\/armorblox-actual-phish\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-actual-phish.png\" data-orig-size=\"3576,1917\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"armorblox-actual-phish\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-actual-phish-300x161.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-actual-phish-600x322.png\" loading=\"lazy\" width=\"600\" height=\"322\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-actual-phish-600x322.png\" alt=\"\" class=\"wp-image-55171\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-actual-phish-600x322.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-actual-phish-300x161.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-actual-phish-1536x823.png 1536w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/armorblox-actual-phish-2048x1098.png 2048w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption>Note that the rhetoric has now shifted from the victim being a fake news proponent to a copyright law-breaker. (Source: Armorblox)<\/figcaption><\/figure>\n<\/div>\n<p>The phishing site also offers up some fraudulent text that can make the whole process feel more official. The text from the phishing site is as follows:<\/p>\n<pre class=\"wp-block-code\"><code>We have received numerous complaints that you violated our copyright laws regarding your account. If you do not give us feedback, your account will be removed within 24 hours. If you think this is wrong, please verify your information below. We ask for this information because we cannot verify that you are the real owner of your account.<\/code><\/pre>\n<p>Be on the lookout, dear Reader, for this or similar campaigns that might land in your work inbox in the future. We always advise caution when dealing with emails\u2014both unsolicited and claiming to have come internally\u2014especially those that want something from you and pressures you to act quickly &#8220;or else&#8221;. If you have an email that you&#8217;re unsure if it&#8217;s a phish, ask your colleagues or contact the person who sent you the email via other means. Better safe than sorry, as they say, because one small slip-up is all it takes for an entire organization to get compromised. After all, big attacks do start small.<\/p>\n<p>Stay safe!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/03\/beware-of-this-bogus-and-phishy-instagram-support-email\/\">Beware of this bogus (and phishy) &#8220;Instagram Support&#8221; email<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/03\/beware-of-this-bogus-and-phishy-instagram-support-email\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Fri, 18 Mar 2022 23:05:32 +0000<\/strong><\/p>\n<p>A fake &#8220;Instagram Support&#8221; email made its way through the spam filter implemented by one major life insurance company in New York. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/03\/beware-of-this-bogus-and-phishy-instagram-support-email\/\">Beware of this bogus (and phishy) &#8220;Instagram Support&#8221; email<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[25442,25443,25444,25445,25446,3924,10502,10510],"class_list":["post-18544","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-armorblox","tag-fake-instagram-support","tag-homograph-attack","tag-instagram-phish","tag-instagram-scam","tag-phishing","tag-phishing-scam","tag-social-engineering"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18544"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18544\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}