Instagram Vulnerability Let Attackers to Take Control of your Account

Researchers detected a critical RCE Instagram vulnerability that allows the threat actors to take control of your Instagram account by sending a simple images to the victim via email, WhatsApp or other media exchange platforms. When the victim opens the Instagram app, the exploitation takes place.

We all know that Instagram is one of the most widespread social networks in the world, as it has more than 100 million photos uploaded daily, and almost 1 billion monthly active users. That’s why, for the threat actors, Instagram is one of the most lucrative targets. 

However, the Check Point researchers revealed all the details regarding this critical vulnerability in Instagram’s Android and iOS app that could have enabled the remote attackers to take control over a targeted device by transferring a specially crafted image to the victims.

Discovery

A crucial vulnerability that might…

Exit mobile version