
Attackers have set up a dark web domain for their “Doxagram” site that offers for sale the email addresses and phone numbers of high-profile Instagram users.
On 5 September, The Daily Beast reporter Joseph Cox tweeted out more than two dozen domains recently purchased by Facebook in an effort to protect Instagram users’ accounts against unauthorized access.
https://twitter.com/josephfcox/status/905000462000295936
As of this writing, Instagram and Facebook together have registered at least 280 domains for “Doxagram,” a service which hackers are using to spread the email addresses and phone numbers of potentially millions of Instagram users.
On the one hand, Doxagram appears to be linked to a incident where hackers exploited a glitch in Instagram’s API to expose the email addresses and phone numbers of only high-profile members like Selena Gomez.
On the other hand, Doxagram also contains regular users’ account data, with the hackers saying they have information pertaining to more than 6 million members, reports The Daily Beast.
Doxagram, which allows anyone to harvest account information for just US $10 a record, originally appeared as a .com domain before getting the boot from its web-hosting company. The service then appeared as a .ws domain before once again going offline. Those responsible for Doxagram suspect Facebook was responsible for these takedowns.
But they’re not worried about Instagram’s efforts. In fact, they think they’re “odd.”
Cox might know whey they feel this way:
“Despite Instagram’s apparent efforts, grabbing as many related domains as possible may do little to stop the flow of this data. Not only do over 1,500 different types of domains exist, the people behind Doxagram have also launched a dark web version of their website.”
A clever move on their part. A dark web site allows the hackers to reach an audience who would truly be interested in purchasing and monetizing users’ stolen Instagram credentials. Also, the hackers don’t need a company like GoDaddy to manage a dark web location; they can do it themselves. This makes it extremely difficult to take down a dark web site unless you have the involvement of federal law enforcement.
Those responsible for Doxagram said their service has made US $4,100 across its public and dark web versions so far.
Given this active “business,” it’s important that Instagram users watch out for phishing emails, calls, or texts that attempt to steal their account credentials. They would also be wise to set up a PIN with their mobile carrier lest someone attempt to steal their phone number and port it to a device under their control.
To learn more about this story, listen to this episode of the “Smashing Security” podcast:
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Recorded Future arms threat analysts, security operators, and incident responders to rapidly connect the dots and reveal unknown threats.
Their patented technology automatically collects and analyzes threat intelligence from technical, open, and dark web sources.
Sign up to their Cyber Daily newsletter and get the latest insights from Recorded Future at recordedfuture.com/intel.
Hello, hello, and welcome to Episode 41 of Smashing Security for the 7th of September, 2017.
My name is Graham Cluley, and I'm joined as ever by my good chum and co-host Carole Theriault. Hello, Carole, how are you?
You've been on the show before, of course, but for those of you who don't know you or haven't heard of you, tell us about yourself.
So yeah, constantly plugged into what's going on and yeah, just trying to raise awareness about security issues and give some helpful advice along the way.
And lots of interesting things have been happening in the last week. One thing which we've touched upon a few times, and I think it's worth touching upon as well this week.
The latest developments in regard to this is the case of Marcus Hutchins, also known as—
He's the young British security researcher and WannaCry accidental hero who got arrested in the United States in relation to the Kronos banking malware.
And as you know, there's been a lot of people in the infosec community who've been supporting Marcus and even raising money to help his legal fight.
But there is something else going on as well.
Brian Krebs, of course, the famous Brian Krebs, superstar security blogger and investigative journalist, has been doing his usual thing, digging deep on the internet, and he found what he claims to be evidence that Marcus Hutchins may have left quite a shady trail for himself on various hacking forums.
Certainly it does suggest that Marcus in earlier years, maybe between about 2009 and 2012 or 2013, using a variety of pseudonyms, not just lurking on these forums, but was quite active.
And it looks like dabbling on the dark side.
There's one piece which is very obvious and visual for people who don't have the patience to read the article.
There's a video on YouTube where somebody is silently demonstrating a Hotmail password cracking tool and showing how you can break into accounts that way.
And for just a couple of seconds, when the screen switches and some windows change, you can see in the background that this user is logged into an MSN Messenger window and you can see the email address, which is logged in there.
So it's curious, but there's lots more there. Go and read the Krebs article.
He's certainly done a lot of good stuff, but it's raised questions about how many of us might have potentially done some shady things in the past.
But are we going to limit ourselves to computers rather than real life?
And Krebs himself says he's found no information to support the claim that he authored or sold the Kronos banking Trojan, which is the main thing that he sort of appears to be being charged in relation to.
But my message, I guess, for everyone is if you're going to pursue a career in infosec, now don't do anything illegal, obviously.
Don't do anything which might cast you in an unethical light, but also learn the elementary lessons about not leaving any digital footprints online because they may kick you up the bum later.
You want to be very careful about the usernames which you use, the email addresses you might use to register domains.
This is the kind of detective work which Krebs has done to pull together the strings of evidence and say, "This looks like Hutchins was doing this." Now, maybe those were errors Hutchins made in his youth.
That all remains to be seen, right? And people do make silly choices in their lives, but maybe he's outgrown that, right? And is now a genuine member of the InfoSec community.
He certainly has contributed an awful lot, not just finding the kill switch in WannaCry.
But there are things which we can all learn, whether we are good guys or bad guys, about not leaving unnecessary breadcrumbs online, which might later come to cause us problems.
And obviously you need to get people's permission before you try and penetrate their website or look for vulnerabilities because you may later get accused of doing things which maybe you didn't have permission to do.
So be careful about that. Go on maybe a white hat ethical hacking course, which can teach you a lot of these techniques as well.
I understand a lot of people are interested in these things.
And I think that's an excellent way for people to kind of learn their way around the systems and do good.
If you can, I know that there are internships with different companies and security researchers, so then you can get real hands-on experience working with someone who knows their stuff.
I think that would add an even deeper level too, but just make sure that you're going to someone reputable and just do your research.
You know, this is how you do it properly. Because they'll have thought about these things and maybe had some of those challenges themselves in the past.
Hey, anyway, on with the show proper. And what we try and do each week is look at the stories which particularly have caught our interest.
Marcus Hutchins, we thought we have to mention that because we've chatted a little bit about it in the past. But one of the things which caught my eye is Doxagram.
Carole, are you an Instagram user?
But anyway, Kim Kardashian has climbed a tree in the nude, and of course she's taken a photograph of herself and posted up on social media.
So the internet's gone completely bonkers, as always. I'm thinking about that because there has been an Instagram hack, of course.
Some people found an API bug on the Instagram site, which meant that it was possible to scoop up millions of users' email addresses and phone numbers, even if they'd set them to private.
And that's bad enough for us regular civilians, right? Us regular people in the street.
But there's another group of people who use Instagram a lot and don't want their details getting out there. And those are those celebrities, right?
Now, no passwords have been breached as a result of this Instagram breach. And Facebook, which owns Instagram, says it's rectified the bug.
So that's preventing more data from dripping out.
But frankly, it's too late because the bad guys have already taken millions of details and they've created this searchable online database which they've called Doxagram, where you can pay a measly $10 to get the details of your favorite celebrity, and then you can ring them up.
I imagine there are other verified users of Instagram who are included in this. But I think the Instagram angle gives us all a handle which we can kind of understand about it.
And the media obviously get more excited because Hermione Granger herself, Emma Watson. She's on the list.
And the Game of Thrones actress Emilia Clarke, and Taylor Swift, and Katy Perry, and your favorite, Carole, Snoop Dogg, Britney Spears, Beckham, even the official President of the United States account.
Doxagram.com got set up and Instagram got it shut down. They said, look, you can't do it, please.
They contacted the domain, the web host, and got it shut down and took the domain over. Then doxagram.ws got set up and again, it was shut down.
And Instagram and Facebook are responding to all of these sites popping up like mushrooms by purchasing loads of domain names in advance.
280 doxagram-related domain names, things like doxagram.lol, doxagram.website, doxagram.hiphop are being purchased.
You know, I guess it's not very much money for them to purchase these things. It doesn't cost much.
The thing is, even if they were able to purchase, which they won't be able to, purchase 1,000 different Doxagram-related domains, there's nothing to stop the bad guys creating a domain called therealdoxagram.com or something like that, is there?
I tell lots of people I don't even have a mobile phone because I don't want them ever ringing me up.
I don't want to have that awkward, no, I'm not going to give you your number thing.
And I said, you know, you had contributed your feet because you have— can I say this on—
Anyway, yes, you're quite right. I don't, we didn't change your room number, did we? Anyway, look, I've learned my lesson, right? I've learned my lesson.
He's posted up a message and he's telling people, look, be on the lookout for anything suspicious, unrecognized incoming calls, text messages, emails.
There's a potential for phishing here. Ransomware, of course.
And yes, you should enable two-factor authentication probably on the Instagram account, although I believe it's still only SMS-based, which some people have concerns about because that's maybe not the best way to do 2FA.
And obviously you should have strong, unique passwords on your Instagram accounts, even though this breach wouldn't necessarily have actually impacted them.
But I just want one of these websites to be better, you know?
You know, I think if you're hoping that nothing ever bad ever happens, you're gonna be hoping a long time.
I mean, that just doesn't make sense.
I've never been, but looking at pictures, it looks like fun.
And apparently it didn't work out so well. Silky Carlo of Liberty went and she was talking to the police there about how they were doing with the technology.
I guess in one day alone there were 35 false positives.
The police showed up, they questioned them, and of course they weren't wanted.
So in fact, across the entire weekend, there's only one correct match for someone who is charged with a rioting offense.
But that person had already been arrested and they weren't wanted anymore. They were asking then the police, okay, well, what do you think about this? What's your response?
And it's like, oh, we had success this weekend. We had a positive match. So I guess it's the lowest threshold here when we're measuring the success rate of technology.
They said, oh, well, we make our own analysis before stopping and arresting the identified person anyway. It's a top-of-the-range algorithm, as they called it.
But so that means basically that their facial recognition software is basically completely fake because we're really in a much earlier phase of infancy in this technology.
Is that your feel?
So two years in a row, this technology has failed to live up to what it's supposed to do. I mean, it gets worse than that.
In 2012, the High Office ruled its collection of images and that kind of thing for police databases illegal. So then it was supposed to develop another—
And all the while, it was still collecting these images and building this database of, I think it's 19 million mugshots now.
So I mean, even then the police can turn them down.
So even then, you're still in the database, it's still showing up as this match.
And that's something then that you might have to deal with constantly over the course of the next three months.
Because I guess most facial recognition technology is racist.
The way that it's designed, and perhaps this is a reflection of who is designing and what sort of pool of people are creating this technology, but it's just less accurate with, say, African Americans and people of color.
So when these people are showing up on the databases, and you also have to account for a higher arrest rate of people of certain races and ethnicities, that means that if there's a bias or an error rate in the database, it's going to be magnified for people of color.
You have to then wonder why we necessarily need facial recognition technology deployed everywhere.
I mean, we don't want that because we want to keep our privacy safe, and there's no reason to constantly be watching people.
But even when there is an event like this, it's very contained, it's very specific, and the technology fails so dramatically, you have to really think twice about deploying it until you cross all your T's.
And in the very least, I mean, the Met should lead the way because I know other facial recognition technologies, they don't test for racial bias or any of that.
I mean, you need to run those tests. And you need to try and just improve it.
But in fact, clearly it was a failure. And this isn't the first time they've had this failure.
Their response to questions about how long false images are being kept doesn't really engender you with much confidence regarding how they're handling this.
So I think we just need a more grown-up and transparent approach to facial recognition being used by police services.
I mean, I think we all want the carnival to be safe and, you know, events to be safe. But clearly at the moment, this is a failure.
We're going to do better next year.
And the thing I know about the Notting Hill Carnival is they have these incredible headdresses.
If you go to Google Images, anyone who hasn't seen the other image search services are available, of course, you will be able to see some incredible pictures.
They're not the spectators.
So we can all appreciate that there's a balancing act, but where's the line? So I was kind of thinking of these questions.
So what if your employer, in the name of physical safety and possibly lower insurance premiums, places live video feeds everywhere in the workplace, including the break areas, locker rooms, and toilets?
What if an employer, right, saying that they were concerned that you were distracted at work, demanded your full online activity report for the last 6 months from IT to review what websites you visited, what you were doing, what emails you sent.
So it would be able to say, we gave you these tasks to do. You completed them by this time. Thank you very much. Good job, right?
This goes back to 2007 where Romanian employee, Mr.
Bărbulescu, was fired from his job for sending private messages to his brother on Yahoo's messaging service, and he was doing this from work.
His employer had surveillance software which monitored Bărbulescu's computer activity. He saw the messages and fired our guy. So Mr.
Bărbulescu then brought his boss to the Romanian courts for unfair dismissal, and last year in 2016—so that's a whopping 9 years later—the Romanian courts ruled that the company was within its rights to monitor employee activity.
And therefore his dismissal was legal.
Were they actually watching his screen to see what he was typing?
But yes, basically there could be software that takes screenshots every 30 seconds, right? There's all this stuff. So Mr. Barbelescu did not take this sitting down.
He went off to the European Court of Human Rights to challenge the decision.
And they were a little more efficient managing the court processes, though I imagine their funding is slightly higher than Romania's.
And this, just this past Tuesday, the Romanian court's ruling was overruled. They said that Mr. Barbarescu's right for privacy was not adequately protected.
So the reasons they said were that it was not clear that his communications would be monitored.
Okay, so one big thing that seems to be across the board, because I've done a little digging around, is that you need to inform your employees. That makes sense, right?
Employees need to be informed clearly. So that's a big one. And two, the reasons for monitoring the employee were not specific enough in the original case in Romanian courts. So why?
It wasn't clear whether it was kind of a vendetta or personal or whether it was actually—
They said, oh, you've been sending lots of messages to your brother, so you're going to have to clear off, you know.
Okay, they can still dismiss employees for private use of email and other devices and services, but they cannot reduce a person's social life in the workplace to zero.
So I went to the ACLU to look into the states to see what— and I was kind of expecting it to be— there'd be a lot more monitoring in the states.
But it seems that employers must notify employees and applicants of electronic monitoring policies. Okay, check.
Employers must provide a visual or oral signal to employees and customers before monitoring. So you didn't say, "Now I'm turning it on." So that's interesting.
Employers must provide employees access to all data obtained by electronic monitoring.
So these are— yeah, they have to basically give a cue to the employee that, hey, we're now switched on and we're recording.
And your question, you know, to the little question I asked earlier, in the States, you cannot monitor restricted areas, including restroom, locker rooms, and lounges.
So now how does that compare to the UK?
In my experience, the privacy of American restrooms is absolutely diabolical compared to our decent European ones.
But anyway, it is discussed in one of our early episodes with Anja Schweitzer.
Now in the UK, your employer can legally monitor your use of the phone, internet, email, and fax, if any company out there still has one, if the monitoring relates to the business, one, if the equipment being monitored is provided partly or wholly for work, and if your employer has made all reasonable efforts to inform you that your communication will be monitored.
OK, so this is where it gets quite interesting in the UK.
So based on those three, as long as they follow those three rules, they can check calls to confidential helplines that an employee might be making.
So in this case, your employer can listen in but is not allowed to record these calls.
Can you imagine if you're calling a suicide hotline and your employer is sitting there listening in?
I think what we need to do is we all need to be very clear about what we've agreed to in the workplace, because these aren't our own devices. We are using someone else's technology.
We're using phones and email systems, which they are paying for.
They are allowed, and this is in the UK, they are allowed to check whether you're using the internet or email for personal use.
An interesting thing as well is for people looking, you know, to applicants, job applicants.
So there seems to be a number of situations where potential employers are asking to be furnished with the social media passwords.
Now, this is something I remember reporting on maybe 5, 10 years ago, and it still seems to be happening.
However, there doesn't seem to be any legal ramification if they choose not to hire you, if you choose not to give your password.
Is this the kind of company you want to work for?
Because you're not just putting yourself at risk, you're putting everyone who's connected and trusts you at risk too.
They should be able to— they need to provide that to you if you request it.
And you want to maybe check your contracts and your work handbooks to see if you've been informed about surveillance within the office place and what it involves.
And if you're going to do personal stuff, I would avoid using work equipment and work accounts and Wi-Fi from the company if you have very sensitive personal communications.
And remember, of course, the safe computing practices, the VPN, the two-factor, the strong passwords on all your devices.
So you don't necessarily need to use your corporate laptop or corporate desktop computer to communicate personal stuff, you can use that phone instead.
You can even make sure that it's not on the company Wi-Fi and it's using 3G.
And maybe you can install an app, something like Signal or whatever, if you want to be ultra paranoid to secure the communications as well.
So you just have to be a little bit more careful. But I think your advice about checking out what your company contracts and what you've actually agreed to may make sense.
Maybe if they don't like you, maybe if they like you too much. And you want to protect yourself against that kind of thing, don't you?
But that was the wake-up call for me that I realized, you know, they have full access.
I mean, to emphasize that point too, besides getting that monitoring policy, I mean, you would hope that a company would do its due diligence and train their employees, have a refresher every year or something just to go over.
It's like, okay, just remember, we're doing this. If you have any questions and then they can talk to their employees about that.
I mean, of course, we know that's not the case with every organization, but everyone that's worth its salt should make sure that their employees know what they're doing.
Recorded Future is the real-time threat intelligence company whose patented machine learning technology continuously analyzes technical, open, and dark web sources to give organizations unmatched insight into emerging threats.
Sign up for free daily threat intelligence updates at recordedfuture.com/intel.
It might have been out for a few weeks actually, but you know what it's like. We're a little bit late on these things.
We were once stuck in some place for some conference, and we were watching this— it was a boring movie, but he did fall asleep about 40 times.
Because that's the way I like to play my dates, with a little bit of danger spliced in.
And she gave me that look like, oh my goodness, is this going to be another one of your documentaries about a vomitarium or something like this? You know, what is this going to be?
Will I like it? And I said, trust me, trust me, trust me. And it's actually surprisingly a romantic comedy. Now normally rom-com just fills me with dread, right?
But this is a good one.
It stars a guy called Kumail Nanjiani and also an actress called Zoe Kazan, and it's the typical story: guy meets girl, he's Pakistani, she's white American, they break up and she falls into a medically induced coma.
It is fun for all the family. It is genuinely enjoyable. It's brilliantly acted, well written, and funny, and I recommend you go and see The Big Sick.
We need more movies like this rather than the normal sort of Hollywood dross. So I enjoyed it. And that is my pick of the week, The Big Sick. David, what's your stick of the week?
So Above and Beyond is a very well-known progressive trance, electronic DJ band. I think they're based in the UK.
And every week they do this radio show where they play their music and a bunch of other artists' music. It's some of the best and newest electronic music out there.
So it's just incredible. I know it's at 2 o'clock, I believe, in the Eastern time zone, so that must place it at around 7 in London time, I believe.
So it's a great way to unwind, get ready for the weekend. You can listen to it on YouTube. I know they also have it on Apple Podcasts and Spotify.
And just as a plug for them, I don't know if there are any tickets left, but they are celebrating their 250th group therapy session in Washington State.
It's great for running, for all you running fans out there.
It's something about Above and Beyond, the way that they blend it together and how it's a little more— I guess that gets more into the trance-like state of the music, how it's just, it's very easy listening and you can get lost in it.
So it's really relaxing.
That's about how close I am to the modern day, but it's in the '60s, Carole.
So I recommend you guys go check it out now so we can get live feedback. So this has been created by Simon Rogers and Alberto Cairo.
And what they wanted to know was what are the top 100 how-tos and how does it change depending on where you are in the world?
So one of their sections, for example, and I'm very interested, Graham, in seeing what you think about the site, because it's quite modern.
And I have a feeling I'm looking at it right now. It's a bit whiz-bang.
And it turns out North Americans and East Asians need to fix their toilets. People from former Soviet countries are fearless enough to attempt fixing their own washing machines.
And in warmer climates, they can't live without fridges.
So there's all these kind of— oh, and Eastern Europeans love to fix their— you know, always looking up how to fix their light bulbs. So they have these sections on cooking.
They have apparently how to tell if someone likes you and all that other love stuff is a huge area, which is not surprising, but it's quite sweet.
It's how do you know, how do you kiss a boy, you know, how do you ask someone?
How to tell if a guy really likes me. Oh yeah, okay.
So that is howtofixatoilet.com.
If people want to follow you online or find out more about you, where's the— what's the best way for them to how do they do that?
And we've got a Facebook group which you can get to via smashingsecurity.com/facebook. Facebook, and we have swag. You can buy t-shirts and mugs and all kinds of other goodies.
Someone bought a sticker the other day from smashingsecurity.com/store. Well, all that remains is to thank you, David.
Thank you, Carole Theriault, for joining us once again this week, and thank you at home for listening as well. If you like the show, tell your friends, leave a review on iTunes.
Please leave a review, though not a nasty one like the one we got this week.

Why do you have a picture of a muppet on a phone for the main image?