Instagram is facing serious hacking problems as one of the Latest phishing scams- The Nasty List Phishing Scam is conquering the users’ inbox. It targets the personal credentials of victims once they visit a profile named as TheNastyList_34 or nastylist-instatop50. After the user gets trapped, his/hers account is used to promote this list further.
It is prevailed via messages sent from a hacked account to users stating the users’ presence on the “Nasty List”. These messages contain framed texts acknowledging the user, “Gosh you have made it to TheNastyList_34, can’t believe your name is on it- number 10. Check fast.”
According to the sources, the message shown above are sent to all the followers of an already hacked account.
If the receiver of such fake message visits the profile with descriptions like The Nasty List_848, “You’re on this list”, “people are crazy about putting everyone’s names on this list, mine is on 30th, you too must check yours” or “Wow you are really on here, ranked 100, can’t wait to reveal this, ITS HORRIBLE!” as displayed in the image.
There is a link attached to the messages that users receive. Once the user visits the in-link profile named as nastylist-instatop50[.]me, they will be redirected to a login page created by Nasty List Phishing Scam similar to that of Instagram’s which requires the login credentials of the user. The page looks lively like that of Instagram’s Login Page except for the URL which says nastylist-instapop50[.]me as shown in the image above. The moment users identify this URL, they are recommended not to enter their login credentials.
Subscribe to our newsletter today to receive updates on the Latest News and Threats.
The researchers at Virus Removal Guidelines are dedicated to track down the latest vulnerabilities which may infringe your system security. Our team of expert performs a detailed research about every malware infection before educating our users about the same.
Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.