AboutPricing
Log inFree Trial!
Back to Blog
Hack
Instagram

Instagram Gave Hackers Access to Devices

11.11.20

The result of this hack led to application malfunctions such as post deletions, private messages being accessed and collected, posting photos without user consent, and the implementation of malicious code. This hack can also disable or render your de

Instagram Gave Hackers Access to Devices 



Check Point Software Technologies (an independent cybersecurity firm) disclosed worrying details in a recent report published regarding a vulnerability within the Instagram application. The exposure reportedly affected Android devices with the Instagram application. This vulnerability could have allowed hackers to access and control a device when a user saves an image to their device. Typically, the image in question has been sent to a user, and the user then saves the image. On some accounts, the image is automatically saved to the user’s device, allowing little to no knowledge of how the hack occurred.

 

The result of this hack led to application malfunctions such as post deletions, private messages being accessed and collected, posting photos without user consent, and the implementation of malicious code. This hack can also disable or render your devices temporarily useless. However, the hack also led to access to the user’s contacts, location data, camera, and stored files within the device. 

 

Instagram (which is owned by Facebook) explained that this attack mainly affected applications using an older version of the application. The update that was released six months prior is the appropriate fix for this hack. They urge users to keep their applications up-to-date in order to block these potential intrusions of privacy and data collection by hackers without your knowledge or consent. Keeping your applications and devices up-to-date is a great strategy to keep potential hackers away. 

 

You should know that Synergy Infosec is not just for business use. Synergy Infosec can help in scenarios like these as well. Personal devices that you believe may have been affected by a hack can be helped, not just devices for commercial use. You can conveniently use our tools dashboard to diagnose potential issues on your own, or you can schedule a quick consultation with one of our team members. 


Protect & Conquer

The first thing any company should think of is protecting their business. Our cybersecurity scanners and tools will protect your business product, so you can focus on conquering the market and leaving your competitors far behind!

Read more
FAQBlog
Subscribe

Sign up to receive our security newsletters