Ugly Photos Scam on Instagram: Do Not Fall For it
The Ugly Photos Instagram Scam
“OMG your actually on here, @TheNastyList_34, your number is 15! it's really messed up.”
How the Ugly Photos Instagram Scam Works?
So, how exactly do hackers trick innocent users into handing over their login information? Cybercriminals spread this scam by sending messages through hacked accounts to the users' followers. The message says the recipients are on the "Ugly List" with a link to a fake Instagram login page. If the recipients click on the link, they will be taken to a fake Instagram website and where they will be asked to sign-in. If visitors to the fake Instagram website attempts to sign into it, their account credentials will be sent to the cybercriminals, who will use it to gain access to the accounts.
Once the cybercriminals have gained access to or hacked the accounts, they will use the accounts to send or post the Instagram 'Ugly List' scams to their followers or friends. Usually, when an Instagram user sees a post from their friends, they will think it is not a scam. This is why Instagram users should be careful of links in messages that take them to login or sign-in pages.
How to Avoid the Ugly Photos Instagram Scam
- Be skeptical of messages from unknown users. If you receive a message from someone you don’t know, it’s best to ignore the message altogether or block the user. Additionally, if you think a friend’s social media account has been compromised, look out for spelling mistakes and grammatical errors in their message, which are common in these scams.
- Exercise caution when inspecting links sent in messages. If you click on a link and it takes you to a sign-in page, think twice before attempting to sign-in.
- Reset your password if your account was hacked by ‘The Nasty List’. This will lock the cybercriminals out of your account. After doing this, search your account for "Ugly Photos Instagram Scam" posts and delete them.
- Share this article with your friends to help educate them about the scam.
Check the comment section below for additional information, share what you know or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search
Click here help maintain Online Threat Alerts (OTA).
Note: Some of the information in samples on this website may have been impersonated or spoofed.
Comments, Questions, Answers, or Reviews
To protect your privacy, please do not post or remove sensitive information in or from your comments, questions, or reviews.
Write Your Comment, Question, Answer, or Review
NB: We will use your IP address to display your approximate location to other users.