Recently, Instagram is having test their new features, which will make life harder for the attacker to compromise the victim’s account. A High-Profile Instagram account is the only target for the hacker because of the influencers of person or company to threatening the user to pay up the ransom
The attacker has taken all possible method so that the victims cannot retrieve their Instagram profiles back using the traditional method.
Instagram have said in a statement
“We know that losing access to your account can be a distressing experience. We have measures in place to stop accounts from being hacked in the first place, as well as measures to help people recover their accounts, but we heard from the community that these measures aren’t enough, and people are struggling to regain access to their accounts.”
As we have known, there a lot of ways that attacker can compromise the Instagram accounts
- Phishing link
- Same login and Password have been used for email that might suffer any data breach
As a result, Instagram did announce that two new features would be able to help victims to retrieve their hacked accounts on Last Monday. Those two new features are such as
- Authentication will send to email or phone that tied to the account
- Instagram will ask the user to key-in the information such as email address and phone number that been tide to Instagram account
The Instagram user can retrieve their compromise Instagram account even though the attacker did change the email address and phone number. Another new feature like Authentication will remove access of the attacker from their device and will be unable to get login back on.
After the victims have re-gains access to their compromise Instagram account, they can choose whether will maintain the original email address and phone number or change to different information.
On a separate feature, Instagram did also announced that they have rolled out to all Android users to stop the name-squatters. On the other hand, this feature will be rolling out within the near future to all iOS device. This will make harder for an attacker to compromise the account because once the user changes their username, it will be locked for a period of time before someone else can claim the username