yitit
Home
/
Computing
/
Hackers use Britney Spears’ Instagram to hide instructions for malware attack
Hackers use Britney Spears’ Instagram to hide instructions for malware attack-October 2024
Oct 27, 2025 12:56 PM

  pwstudio/123RFHacking groups are always working on new ways to perpetrate attacks, and now there’s evidence that a Russian outfit known as Turla has figured out a method of using Instagram to carry out its activities. Earlier this week, a report was published that suggests Britney Spears’ account on the photo-sharing service was used as a staging area for a Trojan attack.

  The information published by antivirus developer Eset revolves around a Firefox browser extension, according to a report from Ars Technica. The extension purported to offer enhanced security, but in fact served to give the hackers a method of seizing control over an infected system.

  Recommended Videos

  A bit.ly URL directed the extension toward its command and control server, but the address was not actually present in its source code. Instead, it was hidden away in a seemingly random comment on one of Spears’ Instagram posts.

  Related

  Hackers are using stolen Nvidia certificates to hide malware

  The extension would pore over each photo’s comments, computing a custom hash value for each string of text. When it found the comment with a hash that matched with the stipulated value of 183, it ran a regular expression — a sequence of characters that defines a search pattern — on the comment to translate it into the URL.

  Eset researchers managed to discover a bit.ly URL hidden in this manner, which linked to a domain that has been used by Turla in the past.

  The URL in question only received a small number of visits around the time when the Instagram post was published, which can be interpreted either as a sign that the malware is still being put through its paces, or that the attack was highly targeted.

  Firefox developers are apparently in the process of tweaking the browser so that the current implementation of this attack won’t work in the future.

Comments
Welcome to yitit comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Login to display more comments
Computing
Recent News
Copyright 2023-2025 - www.yitit.com All Rights Reserved