Best Practices for Mitigating the Risk of Account Takeover (ATO)

Best Practices for Mitigating the Risk of Account Takeover (ATO)

Imagine if your employee email and online accounts were hacked. Cybercriminals could access sensitive company information, hijack senior management's email accounts, and carry out fraudulent activities, including financial fraud. This cyberattack is known as Account Takeover or ATO.

Year-on-year ATO attacks have increased by an average of 354% and have cost US businesses $25.6 billion. Some industries, like food & beverage, have experienced increases of 485%, with fintech firms suffering a staggering 808% YoY increase in ATO attacks. Online merchants are also witnessing the rise of ATO fraud. Automation, new cybercrime techniques, AI-powered phishing, and the proliferation of cloud-based apps and identity accounts (identity sprawl) fuel ATO.

What is Account Takeover (ATO)?

If a cybercriminal can gain access to a user account, they can then take that account over and use it to perform fraudulent actions, This illicit account hijacking is known as Account Takeover (ATO.

Once a cybercriminal has control of an account, they can use that account to access sensitive information, including financial details, impersonate the legitimate account holder (e.g., a CEO), perform fraudulent transactions and make purchases, and lock the user out of their account.

Account Takeover attacks affect both business and their customers.

How Common are ATO Attacks?

How Common are ATO Attacks?

Account Takeover attacks offer cybercriminals power over data, transactions, and finances. As a result, they are surging, with 83% of businesses experiencing an ATO attack. Recent research shows that Account Takeovers are also not a one-off occurrence for a company. Over one-third (37.4%) of businesses experience up to five ATO attacks in a year, with over 14% being hit up to 25 times a year.

Companies worldwide are at risk. An ATO attack could disrupt organizations of all sizes. Some industries most affected include online retailers/merchants, financial services, healthcare, education, gaming, and utilities.

Which option best describes the number of times your organization has been impacted by an account takeover attack (across all applications) in the past year?

Why Is ATO So Dangerous for an SMB?

When an account is taken over, the following scenarios can happen:

Fraud and Financial Loss: Account Takeover Fraud

Fraud and Financial Loss: Account Takeover Fraud

Account takeover fraud focuses on accounts associated with financial transactions, such as an online bank account or payroll. The aim is to steal money, make purchases, or gain information that can be used to steal money.

Sensitive Data Theft

Accounts that hold sensitive information, like names, addresses, phone numbers, medical history, and purchase history, attract ATO attackers. A cybercriminal can access this sensitive data by taking over an account. They can then sell that data to other cybercriminals or use the data to blackmail or socially engineer the legitimate account holder.

Reputational Damage and Loss of Customers' Trust

Cybercriminals often target customer accounts by looking for vulnerabilities in a company's account management system. Customer accounts that suffer ATO attacks are subject to ATO fraud, data theft, and loyalty point theft. Customers affected by ATO lose trust in the targeted company, damaging the brand's reputation.

Operational Disruption and Downtime

The disruption caused by Account Takeovers takes time to sort out. During this downtime and disruption, productivity is negatively impacted and damaged systems and stolen data cost money to fix.

Identity Theft

Once an account has been hijacked, the cybercriminal behind the attack can access personal data. These data are used to carry out fraud and theft in the name of the legitimate account holder. Identity theft can affect both the business and its customers.

The Price of Account Takeover for an SMB

All of the negative effects of having an account hijacked by cybercriminals impact an SMB's bottom line:

Financial Fraud

Financial Fraud

Recent research shows that small companies take an average of 14 months to recognize fraud, and over half (54%) never recover their losses. The median cost of financial fraud to an SMB is $16,000.

Identity Theft

Business identity theft is increasingly a concern for SMBs. Once a business account is taken over, a cybercriminal can use the company's credentials, such as tax identification number, business license, and credit details, to obtain goods, services, or credit. Often, the hacker will also sell these data on the Dark Web to other fraudsters. Research from analyst firm Javelin Strategy & Research found that identity fraud cost US businesses $23 billion.

Business Email Compromise (BEC) Scams

BEC scammers compromise or spoof the email account of a CEO or other C-level executive. They then use that account to trick employees in accounts payable to transfer money to a hacker's bank account. BEC scams target both small and large businesses. Global business losses to BEC fraud have hit $55.5 billion.

Customer Impact

Most consumers (73%) hold brands accountable for preventing ATO fraud on their platforms. Once consumer trust is lost, it is hard to win back. Furthermore, 80% of customers would stop using an online retailer if they'd been a victim of ATO at the site.

Regulatory Fines From Non-Compliance

An ATO attack can lead to non-compliance with various regulations, including GDPR, PCI-DSS, and DORA. Fines can be onerous. DORA, for example, has fines of 2% of total annual turnover or up to 1% of the company's average daily turnover worldwide.

How To Protect Your SMB from Account Takeover Attacks

The costly nature of ATO attacks means that an SMB must take action to protect itself and its customers from this harmful crime. The following measures and tools should be used as payers of protection to prevent an account from being hijacked and used to commit fraud, identity theft, and sensitive data theft.

Security Awareness Training

Regular training on how cybercriminals operate and the tactics used to manipulate people helps employees to recognize a human-centered cyber threat. The training should include topics such as password hygiene and identifying phishing emails and vishing attacks. If possible, some form of security awareness should be made available to customers, such as blog posts on common scams, how to identify phishing emails, the use of strong passwords and MFA, etc.

Robust Identity Management and Zero Trust

Access control to accounts is at the heart of ATO prevention. A robust identity management approach must include the following:

  • Strong, multi-factor authentication (MFA) adds a layer of security to control account access.
  • Risk-based authentication is triggered if unusual account access activity is recognized, such as logging in from an unusual location. The system will either prevent access or request additional verification.
  • Internal access for employees must be based on the principle of least privilege (PoLP). This principle assigns access rights based on a need-to-know basis. Privileged Access Management (PAM) tools can help enforce PoLP.
  • Zero Trust security uses continuous verification of users when they access an account.

UEBA (User Entity Behavioural Analytics)

UEBA tools monitor network activity using machine learning and behavioral analytics. If the UEBA notices any unusual or anomalous activity, it will alert an administrator.

Limit attack vectors:

  • Cybercriminals exploit entry points into a system, like the login page. ATO attacks can be mitigated by using various measures like:
  • Rate limits on login attempts - this helps to prevent brute force attacks.
  • CAPTCHA to stop automated credential stuffing and bots
  • Blocklist suspicious logins from specific VPNs and public Wi-Fis.

Advanced Email Security

AI-powered email filters help prevent phishing emails from landing in employee inboxes. Natural Language Processing (NLP) ensures that even sophisticated spear phishing attacks are identified and stopped.

Device Security

Robust device security helps to prevent SIM Swap attempts that bypass authentication mechanisms. Mechanisms used to secure devices include:

  • Device fingerprinting is used to identify non-sanctioned devices that are being used to log into accounts.
  • Monitoring devices to identify anomalies that may indicate fraudulent activity.
  • Combining device data and user behavior to identify risk.

For small to medium-sized businesses, a managed service provider (MSP) is often the best and most cost-effective option for providing the solutions and measures needed to prevent ATO.

How Does an Account Takeover Happen?

Cybercriminals use various techniques and tactics to gain unauthorized access to company and customer accounts. The following are the most common methods used in ATO attacks:

Credential-Based

Credential-Based

If a cybercriminal can get hold of login credentials, then they will have the keys to the account. The typical ways in which a hacker gains access to account credentials include credential stuffing; previously stolen login credentials, typically available on dark web marketplaces, are used as part of an automated credential stuffing campaign. Cybercriminals automatically try to access multiple accounts using the stolen login credentials.

Other popular methods of stealing credentials include email and SMS text phishing, social engineering, and SIM Swapping, where cybercriminals gain control of your phone number.

Malware-Initiated

Many types of malware are designed to steal login credentials for account takeover purposes. Infostealers, banking trojans, and keyloggers help cybercriminals gain unauthorized account access. The malware may gather keystrokes, take screenshots, or exfiltrate browser-based passwords.

Token/Session Hijacking

If online systems and websites are poorly secured or unencrypted, they can be exploited by attackers. During these attacks, hackers manipulate browser-based authentication cookies to gain unauthorized access to web applications. This is known as cookie poisoning. Even if the cookie has low-level access privileges, hackers can manipulate the cookies to escalate privileges and hijack sessions without login credentials. Hackers will eventually gain unauthorized access to highly privileged accounts business accounts.

Another method used to gain unauthorized access to accounts is a Man-in-the-Middle (MitM) attack. MiTM attacks happen because of insecure, unencrypted sessions, whereby hackers exploit people using unsecured WiFI and insecure websites to steal login credentials as they are submitted. Under these circumstances, if you enter login credentials and click submit, they will be unencrypted and accessible to hackers.

AI and ATO

AI-powered account takeover is making account takeover fraud more difficult to detect. Cyberattackers are using Generative AI to create highly believable and personalized phishing emails and associated spoof login pages. Fraudsters are now also using deepfake technology to carry out social engineering scams.

Real-World Examples of ATO Attacks

Marriott Data Breach

The Marriot hotel chain suffered a large-scale account takeover attack. Unauthorized access compromised the chain's reservation system. Password-stealing malware was located on the company's Starwood server. The ATO attack affected more than 334 million customers. The hotel chain paid a $52 million settlement and a $28.3 million GDPR fine.

E-Commerce Account Takeover in Australia

An Australian e-commerce platform suffered ATO when stolen credentials were used to access multiple user accounts. The attackers used the accounts to make fraudulent purchases. The company incurred estimated losses of AU$500,000 (USD 319,000)

Twitter

Over 130 Twitter accounts with millions of followers were compromised in an ATO scam that relied on the social engineering of Twitter employees. Compromised accounts included those belonging to Barack Obama, Joe Biden, and Elon Musk, as well as companies like Uber and Apple. The hackers used the accounts to pose as celebrities, sending tweets asking people to send bitcoins to a crypto wallet. The ruse was that the person sending the Bitcoin would receive double the amount. The scammers tricked thousands into sending over $100,000 in cryptocurrency.