Rogue app compromises 500,000 Instagram accounts

InstaAgent collected and sent users' unencrypted account details to unknown servers before it was spotted

An app that stole up to half a million Instagram users' account details has been pulled from the Google Play Store and Apple's App Store.

Developer David Layer-Reiss, of Peppersoft Development, discovered that "Who Viewed Your Profile InstaAgent" was collecting login credentials to users' Instagram apps, and sending them, unencrypted, to the developer's server.

Instagram account usernames and passwords were then relayed to unknown servers in plain text, as Layer-Reiss demonstrated with a screen capture shared on Twitter.

Advertisement - Article continues below

It was also responsible for a fair bit of shameless self-promotion, spamming users' Instagram feeds with advertisements for the app without their permission.

He shared his findings in a series of tweets this morning, speculating that the developer had gained access to over 500,000 Instagram accounts.

The free app, which promised users the ability to see who was viewing their Instagram profile, topped the UK and Canadian stores before it was removed earlier today.

A number of apps advertising similar features still exist despite warnings from Instagram to avoid them and attempts to regulate third-party clients.

Apps offering an influx of new followers, claiming to sell likes, or revealing profile viewers generally do not work because information that is not shared with users is not shared with third-party applications, either. In most cases, they simply violate Instagram's terms of service.

Advertisement
Advertisement - Article continues below

To confuse things further, a legitimate app called InstaAgent is available for iOS, this one created by Philadelphia-based developer Craig Pearlman. Pearlman has tweeted about the confusion, attempting to differentiate his app from the information-stealing client making headlines. 

With hundreds of thousands likely affected, anyone who has downloaded the app should consider their Instagram account compromised. Users are advised to remove the app, revoke its access on Instagram, change their password, and monitor their account.

Advertisement - Article continues below

For those who have recycled log-in information for other services, it is best to monitor those accounts and reset those passwords as well - and perhaps not reuse passwords this time.

In the mean time, everyone is left wondering what the developer intended to do with half a million Instagram account details.

An Instagram spokesman told IT Pro"These types of third-party apps violate our platform guidelines and are likely an attempt to get access to a user's accounts in an inappropriate way. We advise against installing third-party apps like these. Anyone who has downloaded this app should delete it and change their password."

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/cloud/356260/the-road-to-recovery
Sponsored

The road to recovery

30 Jun 2020
Visit/business-strategy/it-infrastructure/356258/the-growing-case-for-it-flexibility
Sponsored

The growing case for IT flexibility

30 Jun 2020